Researchers detail a patched RCE flaw in the Apple Lossless Audio Codec on Android devices with Qualcomm and MediaTek chips; Apple open sourced ALAC in 2011
Flaw could be exploited with malicious audio file. — Security researchers said they uncovered a vulnerability that could have allowed hackers … Source: Check Point Software .
Researchers detail a patched RCE flaw in the Apple Lossless Audio Codec on Android devices with Qualcomm and MediaTek chips; Apple open sourced ALAC in 2011
Flaw could be exploited with malicious audio file. — Security researchers said they uncovered a vulnerability that could have allowed hackers … Source: Check Point Software .
Researchers detail newly patched RCE flaw in a widely used audio codec on Android devices with Qualcomm and MediaTek chips; Apple open sourced the codec in 2011
Flaw could be exploited with malicious audio file. — Security researchers said they uncovered a vulnerability … Source: Check Point Software .
Researchers detail newly patched RCE flaw in a widely used audio codec on Android devices with Qualcomm and MediaTek chips; Apple open sourced the codec in 2011
Flaw could be exploited with malicious audio file. — Security researchers said they uncovered a vulnerability … Source: Check Point Software .
Microsoft and cybersecurity company Mandiant say hacking groups linked to China, Iran, North Korea, and Turkey are exploiting the Log4j flaw
Researchers call it one of the most dire cybersecurity threats to emerge in years and could enable devastating attacks
CISA Director Jen Easterly says the Log4j flaw likely affects hundreds of millions of devices and may be the most serious bug she has seen in her career
A vulnerability in a widely used Apache library … Ncsc-Nl / GitHub : Log4j overview related software Kyle Alspach / VentureBeat : Log4j exploits attempted on 44% of corporate netwo...
Check Point details MediaTek DSP firmware vulnerabilities in some Android smartphones that could be exploited to eavesdrop; MediaTek released patches in October
Researcher publishes a proof of concept on GitHub that uses vulnerabilities exploited by hackers to breach Microsoft Exchange servers; GitHub deleted the code
Lorenzo Franceschi-Bicchierai / VICE :
Researchers say a now-patched Alexa vulnerability could have been exploited to hand over users' personal data, voice recordings, banking data history, and more
Subdomains belonging to the service were found to be harboring CORS errors and vulnerable to XSS attacks.
Report: analysis of ~2,000 malware samples attributed to Russian state-sponsored hacking groups shows that the groups rarely share code with one another
A first-of-its-kind research project highlights the connections between nearly 2,000 samples of Russian APT malware.