White Papers
Video
Current Issue
Flash Poll
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Bug Report
From DHS/US-CERT’s National Vulnerability Database
CVE-2020-14103
PUBLISHED: 2021-04-08
The application in the mobile phone can read the SNO information of the device, Xiaomi 10 MIUI < 2020.01.15.
CVE-2020-14106
PUBLISHED: 2021-04-08
The application in the mobile phone can unauthorized access to the list of running processes in the mobile phone, Xiaomi Mobile Phone MIUI < 2021.01.26.
CVE-2021-29154
PUBLISHED: 2021-04-08
Incorrect computation of branch displacements in BPF JIT compilers the Linux kernel can be abused to execute arbitrary code in Kernel mode.
CVE-2021-3146
PUBLISHED: 2021-04-08
The Dolby Audio X2 (DAX2) API service before 0.8.8.90 on Windows allows local users to gain privileges.
CVE-2021-22312
PUBLISHED: 2021-04-08
There is a memory leak vulnerability in some Huawei products. An authenticated remote attacker may exploit this vulnerability by sending specific message to the affected product. Due to not release the allocated memory properly, successful exploit may cause some service abnormal. Affected product in…
The post Fraudsters Use HTML Legos to Evade Detection in Phishing Attack appeared first on Malware Devil.
https://malwaredevil.com/2021/04/08/fraudsters-use-html-legos-to-evade-detection-in-phishing-attack/?utm_source=rss&utm_medium=rss&utm_campaign=fraudsters-use-html-legos-to-evade-detection-in-phishing-attack
No comments:
Post a Comment