Malware Devil

Thursday, April 8, 2021

Fraudsters Use HTML Legos to Evade Detection in Phishing Attack

Register for Dark Reading Newsletters

Subscribe to Newsletters

White Papers

Video

Cartoon

Current Issue

image2021 Top Enterprise IT TrendsWe’ve identified the key trends that are poised to impact the IT landscape in 2021. Find out why they’re important and how they will affect you today!
image

Flash Poll

How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
image

Twitter Feed

Dark Reading - Bug Report

Bug Report

Enterprise Vulnerabilities
From DHS/US-CERT’s National Vulnerability Database
CVE-2020-14103
PUBLISHED: 2021-04-08

The application in the mobile phone can read the SNO information of the device, Xiaomi 10 MIUI < 2020.01.15.

CVE-2020-14106
PUBLISHED: 2021-04-08

The application in the mobile phone can unauthorized access to the list of running processes in the mobile phone, Xiaomi Mobile Phone MIUI < 2021.01.26.

CVE-2021-29154
PUBLISHED: 2021-04-08

Incorrect computation of branch displacements in BPF JIT compilers the Linux kernel can be abused to execute arbitrary code in Kernel mode.

CVE-2021-3146
PUBLISHED: 2021-04-08

The Dolby Audio X2 (DAX2) API service before 0.8.8.90 on Windows allows local users to gain privileges.

CVE-2021-22312
PUBLISHED: 2021-04-08

There is a memory leak vulnerability in some Huawei products. An authenticated remote attacker may exploit this vulnerability by sending specific message to the affected product. Due to not release the allocated memory properly, successful exploit may cause some service abnormal. Affected product in…

The post Fraudsters Use HTML Legos to Evade Detection in Phishing Attack appeared first on Malware Devil.



https://malwaredevil.com/2021/04/08/fraudsters-use-html-legos-to-evade-detection-in-phishing-attack/?utm_source=rss&utm_medium=rss&utm_campaign=fraudsters-use-html-legos-to-evade-detection-in-phishing-attack

No comments:

Post a Comment

Barbary Pirates and Russian Cybercrime

In 1801, the United States had a small Navy. Thomas Jefferson deployed almost half that Navy—three frigates and a schooner—to the Barbary C...