Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
![News.webp](./Ressources/img/News.webp) |
2022-06-10 11:00:08 |
Apple M1 chip contains hardware vulnerability that bypasses memory defense (lien direct) |
MIT CSAIL boffins devise PACMAN attack to let existing exploits avoid pointer authentication Apple's M1 chip has been found to contain a hardware vulnerability that can be abused to disable one of its defense mechanisms against memory corruption exploits, giving such attacks a greater chance of success.… |
Vulnerability
|
|
|
![News.webp](./Ressources/img/News.webp) |
2022-06-09 11:45:09 |
Symantec: More malware operators moving in to exploit Follina (lien direct) |
Meanwhile Microsoft still hasn't patched the fatal flaw While enterprises are still waiting for Microsoft to issue a fix for the critical "Follina" vulnerability in Windows, yet more malware operators are moving in to exploit it.… |
Malware
Vulnerability
|
|
|
![News.webp](./Ressources/img/News.webp) |
2022-05-24 10:04:08 |
It\'s 2022 and there are still malware-laden PDFs in emails exploiting bugs from 2017 (lien direct) |
Crafty file names, encrypted malicious code, Office flaws – ah, it's like the Before Times HP's cybersecurity folks have uncovered an email campaign that ticks all the boxes: messages with a PDF attached that embeds a Word document that upon opening infects the victim's Windows PC with malware by exploiting a four-year-old code-execution vulnerability in Microsoft Office.… |
Malware
Vulnerability
|
|
|