
Tencent Blade Team found serious SQLite vulnerability
[ad_1] Recently, the Tencent Blade Team discovered a set of SQLite vulnerabilities called “Magellan 2.0”, allowing hackers to remotely run various malicious programs on the
[ad_1] Recently, the Tencent Blade Team discovered a set of SQLite vulnerabilities called “Magellan 2.0”, allowing hackers to remotely run various malicious programs on the
[ad_1] Nvidia has released an emergency security update for the GeForce Experience software to all users. The update aims to fix high-risk security vulnerabilities in
[ad_1] Hackers can use vulnerabilities (CVE-2019-19781) in Citrix’s Application Delivery Controller (NetScaler ADC) and Gateway (NetScaler Gateway) to sneak into the company’s intranet. The vulnerability
[ad_1] Twitter issued a new security alert. The company said that the security team found a serious security vulnerability in the Twitter app for Android.
[ad_1] For the jailbreak community, when someone finds a vulnerability that can jailbreak new devices and new versions of iOS, it often makes crackers and
[ad_1] On December 17, Microsoft officially released the CVE-2019-1491 vulnerability warning and patch. Microsoft SharePoint is a set of corporate business collaboration platforms from Microsoft.
[ad_1] Recently, Django officially released a security bulletin to fix a security vulnerability. The high-risk vulnerability is CVE-2019-19844. Django’s password-reset form uses a case-insensitive query
[ad_1] 360 Group cooperated with Mercedes-Benz and fixed 19 related potential vulnerabilities in Mercedes-Benz intelligent connected cars. It is reported that this is the first
[ad_1] Schneider Electric recently resolved DoS vulnerabilities in Modicon M580, M340, Quantum, and Premium controllers, and stated that all three defects were caused by improper
[ad_1] Apple has enhanced parental controls in the latest official version of iOS 13.3, allowing parents to remotely load contact lists on their children ’s
[ad_1] Both Microsoft and Google have released software updates yesterday to fix some security vulnerabilities, including a zero-day vulnerability that has been exploited in the
[ad_1] Security company Rapid7 has disclosed security vulnerabilities in three children’s smartwatches sold on Amazon. These three children’s smartwatches are the GreaSmart, the Jsbaby, and
[ad_1] Recently, researchers have discovered that undocumented features in Intel CPUs allow attackers to manipulate Intel CPU voltages in a controlled manner to trigger calculation
[ad_1] On December 11, 2019, Microsoft and Adobe released the December security update. The types of vulnerabilities addressed include out-of-bounds reads and write, some untrusted
[ad_1] Red Hat and CentOS have announced the availability of important kernel security updates for their Red Hat Enterprise Linux 7 and CentOS Linux 7
[ad_1] Recently, security researchers at a professional application security protection company, Promon said that they found a vulnerability in the Android operating system and named
[ad_1] A security issue discovered by security research company SafeBreach in Kaspersky Secure Connection, which itself is bundled into a range of other Kaspersky security
[ad_1] Google released a December 2019 Android security patch for its latest Android 10 mobile operating system series to address some of the most critical
[ad_1] With the rise of instant messaging applications such as WhatsApp, Signal, and Telegram. A large number of similar applications have begun to steal telecommunications
[ad_1] HPE’s enterprise-class solid-state drives have time bombs. HPE issued an emergency safety notice saying that some of its models of solid-state drives will stop
[ad_1] Recently, Check Point researchers analyze a vulnerability (CVE-2019-10574) discovered in the Qualcomm Trusted Execution Environment (TEE) for Android devices. An attacker could exploit this
[ad_1] Recently, Solr officially released a security update to fix RCE vulnerability (CVE-2019-12409) due to a bad config default. Solr is apache’s top-level open source
[ad_1] Android security flaws allow applications to access people’s cameras for secret video and audio recording. Android smartphones from companies such as Google and Samsung
[ad_1] Last weekend, the Chinese hacking contest, Tianfu Cup officially began in Chengdu, and hackers from China won the championship in this war. In two
[ad_1] WhatsApp quietly patched a critical vulnerability in its application last month that could allow an attacker to remotely compromise a target device and potentially
[ad_1] In a study funded by the US Department of Homeland Security, Kryptowire found a serious security risk from pre-installed applications on cheap Android smartphones.
[ad_1] Canonical has released a new set of Linux kernel security updates for all of its supported Ubuntu releases to address the latest Intel CPU
[ad_1] The Debian Project released a new Linux kernel security update for its supported version of Debian GNU/Linux to address the latest vulnerabilities affecting Intel’s
[ad_1] Recently, the security team found the Apache Flink arbitrary Jar package to upload the attack data that caused the remote code execution vulnerability. The
[ad_1] Recently, Apache Shiro Padding Oracle reveals remote code execution vulnerability. After we analysis and judgment, it is judged that the level of the vulnerability
[ad_1] To prevent the Zombieload v2 attack that was just exposed, Microsoft Windows and Linux kernel teams have introduced methods to turn off Intel Transactional
[ad_1] Although 5G is faster and more secure than 4G, new research indicates that it still has some vulnerabilities, which poses a certain risk to
[ad_1] On November 12, 2019, Microsoft routinely released a security update for November. The security update covers the Windows operating system, IE/Edge browser, scripting engine/ChakraCore,
[ad_1] In the recent GeForce 441.12 release, NVIDIA fixed several undisclosed high-risk vulnerabilities, and these vulnerabilities also existed in Quadro, NVS, and Tesla’s Windows drivers.
[ad_1] Although the JavaScript library jQuery is still being used, it is no longer as popular as it used to be. According to the open-source
[ad_1] Microsoft’s security team believes that a more destructive BlueKeep attack is coming, and urges users and companies to install application patches in a timely
[ad_1] Squid is a caching and forwarding HTTP web proxy. It has a wide variety of uses, including speeding up a web server by caching
[ad_1] Firefox browsers for Mac and Windows have recently become targets of some malicious website attacks, which display false warning notifications and completely lock up
[ad_1] Recently, CCN security researcher Willian Worrall exposed a security flaw in Epic Games Store which players can play without barriers even if they have
[ad_1] Earlier this year, Microsoft made another exception to release a security update to Windows XP. This security update addresses the Windows RDP/RDS vulnerability. This
[ad_1] Two serious zero-day vulnerabilities have been fixed in the emergency patch released yesterday by Google, and one of them has been exploited by hackers.
[ad_1] On October 31, 2019, the security researcher S00pY on GitHub release the Apache Solr RCE via the Velocity template PoC. After testing, the poc
[ad_1] Greg Kroah-Hartman, a stable kernel maintainer, said in a keynote speech at the Open Source Summit Europe that the security of Intel chips will
[ad_1] Microsoft acknowledges a security vulnerability on Windows 10 Mobile that “allows a user to access files and folders through the locked screen“. The good
[ad_1] The Google Chrome development team has now released a new version of the stable channel, Chrome v77.0.3865.120 which is mainly a security improvement that
[ad_1] Recently, Morphisec Labs researchers revealed that a hacker organization is using the zero-day vulnerability of the Bonjour component to attack, which is likely to
[ad_1] The Windows 10 Update Assistant, has recently been revealed by researchers to have significant security breaches affecting tens of millions of home and business
[ad_1] Recently, SafeBreach Labs security researchers revealed a privilege escalation vulnerability (CVE-2019-6333) in a pre-installed HP computer, HP Touchpoint Analytics that could allow an attacker
[ad_1] Just two days ago, a mobile security company, Adaptive Mobile, which discovered the Simjacker attack, released a list of local mobile carriers shipping SIM
[ad_1] As one of the most commonly used utilities in Linux, Sudo is installed on almost every UNIX and Linux distribution for users to invoke
Cybarrior was founded in 2019 and aims to provide the best online security platform for future and expert cyber professionals around the globe.
Forward any inquiries or requests to admin@cybarrior.com