0 Comentários
0 Compartilhamentos
3053 Visualizações
Pesquisar
Conheça novas pessoas, crie conexões e faça novos amigos
-
- EXPLORAR
-
-
-
-
- Faça Login para curtir, compartilhar e comentar!
- AMD, Apple, Qualcomm GPUs leak AI data in LeftoverLocals attacksJanuary 17, 2024 10:32 AM 0 A new vulnerability dubbed 'LeftoverLocals' affecting graphics processing units from AMD, Apple, Qualcomm, and Imagination Technologies allows retrieving data from the local memory space. Tracked as CVE-2023-4969, the security issue enables data recovery from vulnerable GPUs, especially in the context of large language...0 Comentários 0 Compartilhamentos 4180 Visualizações
- Anatsa Android malware downloaded 150,000 times via Google PlayFebruary 19, 2024 08:34 AM 1 The Anatsa banking trojan has been targeting users in Europe by infecting Android devices through malware droppers hosted on Google Play. Over the past four months, security researchers noticed five campaigns tailored to deliver the malware to users in the UK, Germany, Spain, Slovakia, Slovenia, and the Czech Republic....0 Comentários 0 Compartilhamentos 3248 Visualizações
- Android bug can leak DNS traffic with VPN kill switch enabledMay 3, 2024 05:02 PM 1 Image: Midjourney A Mullvad VPN user has discovered that Android devices leak DNS queries when switching VPN servers even though the "Always-on VPN" feature was enabled with the "Block connections without VPN" option. "Always-on VPN" is designed to start the VPN service when the device boots and keep it running while the...0 Comentários 0 Compartilhamentos 464 Visualizações
- AnyCubic fixes exploited 3D printer zero day flaw with new firmwareMarch 7, 2024 11:10 AM 0 AnyCubic has released new Kobra 2 firmware to fix a zero-day vulnerability exploited last month to print security warnings on 3D printers worldwide. At the end of February, AnyCubic printer users began reporting that their Kobra 3D printers were hacked with a print job that warned their devices were vulnerable to a...0 Comentários 0 Compartilhamentos 2267 Visualizações
- Apple: Mercenary spyware attacks target iPhone users in 92 countriesApril 11, 2024 10:16 AM 2 Apple has been notifying iPhone users in 92 countries about a "mercenary spyware attack" attempting to remotely compromise their device. In a sample notification the company shared with BleepingComputer, Apple says that it has high confidence in the warning and urges the recipient to take seriously. "Apple detected that you are...0 Comentários 0 Compartilhamentos 1219 Visualizações
- Chrome Enterprise gets Premium security but you have to pay for itApril 10, 2024 03:52 PM 1 Google has announced a new version of its browser for organizations, Chrome Enterprise Premium, which comes with extended security controls for a monthly fee per user. The product is a step up from Chrome Enterprise, now demoted to Chrome Enterprise Core, and provides threat and data protection, increased control options, and...0 Comentários 0 Compartilhamentos 901 Visualizações
- Citrix, Sophos software impacted by 2024 leap year bugsFebruary 29, 2024 01:30 PM 0 Citrix and Sophos products have been impacted by leap year flaws, leading to unexpected problems in their products. Leap years solve the synchronization problem caused by the Gregorian calendar measuring a year in 365 days, while the astronomical year is 365.24 days. During leap years, an extra day is added to February, the 29th,...0 Comentários 0 Compartilhamentos 2257 Visualizações
- Critical TeamCity flaw now widely exploited to create admin accountsMarch 6, 2024 07:19 PM 0 Hackers have started to exploit the critical-severity authentication bypass vulnerability (CVE-2024-27198) in TeamCity On-Premises, which JetBrains addressed in an update on Monday. Exploitation appears to be massive, with hundreds of new users created on unpatched instances of TeamCity exposed on the public web. Risk of supply-chain...0 Comentários 0 Compartilhamentos 2408 Visualizações
- Fake LastPass password manager spotted on Apple’s App StoreFebruary 8, 2024 12:02 PM 1 LastPass is warning that a fake copy of its app is being distributed on the Apple App Store, likely used as a phishing app to steal users' credentials. The fake app uses a similar name to the genuine app, a similar icon, and a red-themed interface made to appear close to the brand's authentic design. However, the fake app's name...0 Comentários 0 Compartilhamentos 2778 Visualizações
Páginas Impulsionadas
© 2024 AFFA Social Underground Portuguese