Remove 2011 Remove Libraries Remove Security
article thumbnail

XDSpy APT remained undetected since at least 2011

Security Affairs

Researchers from ESET uncovered the activity of a new APT group, tracked as XDSpy, that has been active since at least 2011. XDSpy is the name used by ESET researchers to track a nation-state actor that has been active since at least 2011. The post XDSpy APT remained undetected since at least 2011 appeared first on Security Affairs.

Military 361
article thumbnail

CVE-2018-15919 username enumeration flaw affects OpenSSH Versions Since 2011

Security Affairs

Qualys experts discovered that OpenSSH is still vulnerable to Oracle attack, it is affected by the CVE-2018-15919 flaw at least since September 2011. Security experts from Qualys discovered that OpenSSH is still vulnerable to Oracle attack, it is affected by the CVE-2018-15919 flaw at least since September 2011.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Rapid7 announced the release of Metasploit 5.0

Security Affairs

include new database and automation APIs, evasion modules and libraries, language support, improved performance. “As the first major Metasploit release since 2011, Metasploit 5.0 “As the first major Metasploit release since 2011, Metasploit 5.0 appeared first on Security Affairs. Metasploit 5.0

Libraries 280
article thumbnail

PyMICROPSIA Windows malware includes checks for Linux and macOS

Security Affairs

AridViper is an Arabic speaking APT group that is active in the Middle East since at least 2011. ’ PyMICROPSIA uses Python libraries to implements multiple operations, including data theft, Windows process and systems interaction. ” Pierluigi Paganini. SecurityAffairs – hacking, Arid Viper).

article thumbnail

YTStealer info-stealing malware targets YouTube content creators

Security Affairs

To control the browser, the malware uses a library called Rod. Aparat is an Iranian video-sharing site that was founded in 2011. “When it comes to how to protect yourself, the classic security practice should be applied. A Google image search using the icon returned some results with the same image. Pierluigi Paganini.

article thumbnail

The analysis of the code reuse revealed many links between North Korea malware

Security Affairs

Security researchers at Intezer and McAfee have conducted a joint investigation that allowed them to collect evidence that links malware families attributed to North Korean APT groups such as the notorious Lazarus Group and Group 123. Further shared code across these families is an AES library from CodeProject. Pierluigi Paganini.

Libraries 174
article thumbnail

memcpy (and friends) with NULL pointers

Imperial Violet

The C standard (ISO/IEC 9899:2011) has a sane-seeming definition of memcpy (section 7.24.2.1): The memcpy function copies n characters from the object pointed to by s2 into the object pointed to by s1. can be applied to any standard library function. The compiler's reasoning goes like this: 7.1.4 Section 7.1.4 Measurement. assumptions.

Libraries 141