|
You are here |
malgregator.com | ||
| | | | |
blog.trailofbits.com
|
|
| | | | | Since 2012, Trail of Bits has helped secure some of the world's most targeted organizations and products. We combine high-end security research with a real world attacker mentality to reduce risk and fortify code. | |
| | | | |
reverse.put.as
|
|
| | | | | Today a local privilege escalation vulnerability was disclosed in this blog post. It describes a vulnerability in IOBluetoothFamily kernel extension (IOKit is a never-ending hole of security vulnerabilities). Mavericks and most probably all previous versions are vulnerable but not Yosemite. The reason for this is that Apple silently patched the bug in Yosemite. This is not a new practice, where Apple patches bugs in the latest and newly released OS X version and doesn't care about older versions. | |
| | | | |
www.sonatype.com
|
|
| | | | | Sonatype's malware detection identified a malicious PyPI package called crytic-compilers, connected to Russia-linked Lumma Windows stealer. Learn More. | |
| | | | |
www.trendmicro.com
|
|
| | | The newly discovered Underminer exploit kit delivers a bootkit that infects the system's boot sectors as well as a cryptocurrency-mining malware named Hidden Mellifera. | ||