Skip to content
vshieldz
Home Page
Services
Our Partner
News
Contact

Call us anytime

+84949482065

Author: System

This author has written 404 articles
  1. Home>
  2. System>
  3. Page 7
Read more about the article Kibana arbitrary code execution via prototype pollution (ESA-2024-22)

Kibana arbitrary code execution via prototype pollution (ESA-2024-22)

  • Post author:System
  • Post published:17 August 2024
  • Post category:Blog & News

A critical security flaw, CVE-2024-37287, has been identified in Kibana, an open-source data visualization and exploration tool, which could allow attackers to execute arbitrary code via a prototype pollution vulnerability.…

Continue ReadingKibana arbitrary code execution via prototype pollution (ESA-2024-22)
Read more about the article Hijacked: How Cybercriminals Are Turning Anti-Virus Software Against You

Hijacked: How Cybercriminals Are Turning Anti-Virus Software Against You

  • Post author:System
  • Post published:17 August 2024
  • Post category:Blog & News

Threat actors have been found hijacking legitimate anti-virus software to conduct undetected malicious activities, using a new tool called SbaProxy that masquerades as legitimate anti-virus components to create proxy connections…

Continue ReadingHijacked: How Cybercriminals Are Turning Anti-Virus Software Against You
Read more about the article NIST Releases Post-Quantum Cryptography Standards

NIST Releases Post-Quantum Cryptography Standards

  • Post author:System
  • Post published:17 August 2024
  • Post category:Blog & News

The US National Institute of Standards and Technology (NIST) has published three post-quantum cryptography (PQC) algorithms: ML-KEM (Kyber), ML-DSA (Dilithium), and SLH-DSA (Sphincs+). A fourth algorithm, FN-DSA (FALCON), is expected…

Continue ReadingNIST Releases Post-Quantum Cryptography Standards
Read more about the article Crash Reports Hold Valuable Vulnerability Information

Crash Reports Hold Valuable Vulnerability Information

  • Post author:System
  • Post published:10 August 2024
  • Post category:Blog & News

Speaking at the BlackHat USA conference earlier this week, security researcher Patrick Wardle said that computer crash reports offer “a myriad of information that will allow us to extract malware,…

Continue ReadingCrash Reports Hold Valuable Vulnerability Information
Read more about the article 0.0.0.0 Vulnerability

0.0.0.0 Vulnerability

  • Post author:System
  • Post published:10 August 2024
  • Post category:Blog & News

Researchers at Oligo Security have identified a zero-day vulnerability affecting all major browsers that could be exploited to bypass browser security and possibly access local networks. According to the researchers,…

Continue Reading0.0.0.0 Vulnerability
Read more about the article CrowdStrike Publishes External Technical Root Cause Analysis

CrowdStrike Publishes External Technical Root Cause Analysis

  • Post author:System
  • Post published:10 August 2024
  • Post category:Blog & News

CrowdStrike has published a technical root cause analysis of the July 19 incident that disrupted travel and commerce worldwide due to an out-of-bounds read issue “beyond the end of the…

Continue ReadingCrowdStrike Publishes External Technical Root Cause Analysis
Read more about the article Police in Singapore Recover Millions Stolen in Business eMail Compromise Scheme

Police in Singapore Recover Millions Stolen in Business eMail Compromise Scheme

  • Post author:System
  • Post published:8 August 2024
  • Post category:Blog & News

Authorities have seized over $41 million that was stolen from a commodities firm in Singapore in a business email compromise (BEC) attack. The thieves, impersonating a supplier, requested that a…

Continue ReadingPolice in Singapore Recover Millions Stolen in Business eMail Compromise Scheme
Read more about the article Linux Kernel SLUBStick Attack

Linux Kernel SLUBStick Attack

  • Post author:System
  • Post published:8 August 2024
  • Post category:Blog & News

Researchers from Graz University of Technology in Austria have published a paper that describes “a novel kernel exploitation technique elevating a limited heap vulnerability to an arbitrary memory read-and-write primitive.”…

Continue ReadingLinux Kernel SLUBStick Attack
Read more about the article AWS is Using a Neural Network to Detect Malicious Domains

AWS is Using a Neural Network to Detect Malicious Domains

  • Post author:System
  • Post published:8 August 2024
  • Post category:Blog & News

AWS says it is using a neural network called Mithra, “a massive internal neural network graph model … that uses algorithms for threat intelligence” to identify malicious domains. Mithra has…

Continue ReadingAWS is Using a Neural Network to Detect Malicious Domains
Read more about the article US Sanctions Hackers Who Targeted Water Utilities

US Sanctions Hackers Who Targeted Water Utilities

  • Post author:System
  • Post published:30 July 2024
  • Post category:Blog & News

The US Treasury Department has imposed sanctions on two individuals for their alleged involvement in cyberattacks against elements of US critical infrastructure. Yuliya Pankratova allegedly oversaw operations for a hacking…

Continue ReadingUS Sanctions Hackers Who Targeted Water Utilities
  • Go to the previous page
  • 1
  • …
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • …
  • 41
  • Go to the next page
footer
vShieldz Technologies Ltd
+84949482065
  • [email protected]
  • 429 Le Van Viet st, Tang Nhon Phu A, Thu Duc, Ho Chi Minh city, Vietnam

links

  • Our Partner
  • Our Services
  • Contact Us
  • News

recent post

  • The Rise of Arsink Rat
    The Rise of Arsink Rat
    5 February 2026/
    0 Comments
  • Phishing Campaigns Abuse Trusted Cloud Platforms, Raising New Risks for Enterprises
    Phishing Campaigns Abuse Trusted Cloud Platforms, Raising New Risks for Enterprises
    5 February 2026/
    0 Comments
Copyright 2021 vShieldz Technologies Ltd
Thiết Kế Bởi Vĩnh XD