Aggregator
CVE-2024-46855 | Linux Kernel up to 6.1.110/6.6.51/6.10.10 nft_socket reference count
CVE-2024-46858 | Linux Kernel up to 6.1.110/6.6.51/6.10.10 mptcp sk_stop_timer_sync use after free
CVE-2024-46853 | Linux Kernel up to 6.1.110/6.6.51/6.10.10 nxp-fspi out-of-bounds
CVE-2024-46847 | Linux Kernel up to 6.6.50/6.10.9 new_vmap_block array index (1b2770e27d6d/6cf74e0e5e3a/3e3de7947c75)
CVE-2024-46868 | Linux Kernel up to 6.10.10 uefisecapp qcuefi_acquire deadlock (8c6a5a1fc02a/db213b0cfe32)
CVE-2024-46865 | Linux Kernel up to 6.1.110/6.6.51/6.10.10 initialization
What DNS over HTTPS (DoH) Is and How to Enable in Windows 10
What is DNS? DNS (Domain Name System) is a key component of the Internet infrastructure. DNS functions as a distributed directory service that translates human-readable domain names into machine-readable IP addresses. When you type a website address into your browser, the DNS system helps your browser find the right server on the internet. When people … Continued
Ireland's DPC Hits Meta with €91 Million Penalty for GDPR Violation
更换清洗床上用品的频率
Hackers Abuse HTML Smuggling Technique To Deliver Sophisticated Phishing Page
Phishing attackers employed an HTML smuggling technique to deliver a malicious payload, as the attack chain started with a phishing email mimicking an American Express notification, leading to a series of redirects. The final redirect pointed to a Cloudflare R2 public bucket hosting an HTML file, which loaded an external JavaScript code that contained a […]
The post Hackers Abuse HTML Smuggling Technique To Deliver Sophisticated Phishing Page appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
LummaC2 Stealer Leverages Customized Control Flow Indirection For Execution
The LummaC2 obfuscator employs a novel control flow protection scheme designed specifically for its stealer component, which is part of a broader set of transformations, making it difficult for analysts to reverse engineer the binary. It introduces obfuscated code that is mixed with the original compiler-generated code, requiring a specialized deobfuscator for analysis. The obfuscator’s […]
The post LummaC2 Stealer Leverages Customized Control Flow Indirection For Execution appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.