Tag: EN

Linux Kernel Netfilter Flaw Enables Privilege Escalation

A critical vulnerability in the Linux kernel’s netfilter subsystem has been discovered that allows local attackers to escalate privileges through an out-of-bounds write condition. The flaw, identified as CVE-2024-53141, affects the ipset bitmap functionality and could enable unprivileged users to gain…

DoJ Seizes $2.8M in Crypto from Zeppelin Ransomware Group

The Department of Justice has announced a significant victory against cybercriminals, seizing over $2.8 million in cryptocurrency and additional assets from a Zeppelin ransomware operation. The coordinated law enforcement action targeted Ianis Aleksandrovich Antropenko, who faces federal charges for his…

Chinese APT Group Targets Web Hosting Services in Taiwan

Cisco Talos observed the newly identified group compromise a Taiwanese web hosting provider to conduct a range of malicious activities This article has been indexed from www.infosecurity-magazine.com Read the original article: Chinese APT Group Targets Web Hosting Services in Taiwan

An explanation of quantum key distribution

<p><i>In this video, Informa TechTarget managing editor Kate Murray explains how quantum key distribution uses physics principles to create more secure cryptographic keys that classic computing can’t hack.</i></p> <div class=”ad-wrapper ad-embedded”> <div id=”halfpage” class=”ad ad-hp”> <script>GPT.display(‘halfpage’)</script> </div> <div id=”mu-1″ class=”ad…

What is Use-After-Free Vulnerability? – Impact and Mitigation

Use-after-free (UAF) vulnerabilities represent one of the most critical and prevalent security threats in modern software systems, particularly affecting applications written in memory-unsafe languages like C and C++. These vulnerabilities occur when a program continues to use a memory location…