y spyterms.q By packetstormsecurity.com Published On :: Mon, 26 Aug 2002 17:52:35 GMT -=-=-=-=-=-=-=-=-=-=-=-=-=- Surveillance & Security Terminology and Definitions Reference File -=-=-=-=-=-=-=-=-=-=-=-=-=- by Alan Hoffman a.k.a -Q- ========================= Full Article
y SkypeFinds Another Security Snafu By packetstormsecurity.com Published On :: Fri, 01 Feb 2008 11:42:41 GMT Full Article voip
y Skype Squishes Cross-Zone Scripting Bug By packetstormsecurity.com Published On :: Wed, 06 Feb 2008 04:38:37 GMT Full Article voip skype
y Security Hack Allows VoIP Aboard Airlines By packetstormsecurity.com Published On :: Mon, 25 Aug 2008 14:29:24 GMT Full Article voip
y Skype Ignores PayPal Siphoning Hijack Scheme By packetstormsecurity.com Published On :: Tue, 02 Sep 2008 22:10:52 GMT Full Article paypal voip skype
y VoIP System Users Can Be Targeted In Attacks By packetstormsecurity.com Published On :: Fri, 26 Sep 2008 08:10:30 GMT Full Article voip
y Skype Admits Privacy Violation In China By packetstormsecurity.com Published On :: Thu, 02 Oct 2008 09:58:16 GMT Full Article privacy china voip skype
y Chinese Skype Software Secretly Logs Political Chat Messages By packetstormsecurity.com Published On :: Thu, 02 Oct 2008 16:34:11 GMT Full Article government china voip skype
y Italy Police Warn Of Skype Threat By packetstormsecurity.com Published On :: Sat, 14 Feb 2009 00:08:41 GMT Full Article government voip skype italy
y Skype Trojan Can Log VoIP Conversations By packetstormsecurity.com Published On :: Fri, 28 Aug 2009 00:14:17 GMT Full Article trojan voip skype
y Steganography Meets VoIP In Hacker World By packetstormsecurity.com Published On :: Fri, 11 Sep 2009 14:47:15 GMT Full Article hacker voip
y Scareware Scams Spill Onto Skype By packetstormsecurity.com Published On :: Tue, 06 Oct 2009 18:33:02 GMT Full Article scam voip skype
y Reverse Engineer Extracts Skype Crypto Secret Recipe By packetstormsecurity.com Published On :: Fri, 09 Jul 2010 03:54:59 GMT Full Article voip skype
y Hackers Crack Skype's Proprietary VOIP Protocol By packetstormsecurity.com Published On :: Mon, 12 Jul 2010 11:15:31 GMT Full Article hacker voip skype
y Google And Skype Could Be Hit By India Data Curbs By packetstormsecurity.com Published On :: Tue, 31 Aug 2010 15:56:40 GMT Full Article india google voip skype
y Skype Flaw Allows For Collection Of User IP Addresses By packetstormsecurity.com Published On :: Tue, 01 May 2012 21:23:32 GMT Full Article headline privacy flaw voip skype
y Bro Network Security Monitor 2.6.3 By packetstormsecurity.com Published On :: Fri, 09 Aug 2019 20:33:35 GMT Bro is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Bro provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Bro has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Bro's user community includes major universities, research labs, supercomputing centers, and open-science communities. Full Article
y Bro Network Security Monitor 2.6.4 By packetstormsecurity.com Published On :: Wed, 28 Aug 2019 23:57:22 GMT Bro is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Bro provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Bro has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Bro's user community includes major universities, research labs, supercomputing centers, and open-science communities. Full Article
y Zeek 3.0.0 (Formerly Known As Bro) By packetstormsecurity.com Published On :: Sat, 05 Oct 2019 13:21:53 GMT Zeek is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Zeek provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Zeek has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Zeek's user community includes major universities, research labs, supercomputing centers, and open-science communities. Full Article
y Hackers Are Selling A Critical Zoom Zero-Day Exploit For $500,000 By packetstormsecurity.com Published On :: Thu, 16 Apr 2020 15:30:36 GMT Full Article headline hacker flaw
y How To Hack A Company By Circumventing Its WAF For Fun And Profit - Part 2 By packetstormsecurity.com Published On :: Tue, 21 Apr 2020 20:35:24 GMT Full Article headline hacker flaw
y Red Hat Security Advisory 2020-1351-01 By packetstormsecurity.com Published On :: Tue, 07 Apr 2020 16:41:56 GMT Red Hat Security Advisory 2020-1351-01 - Kernel-based Virtual Machine is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM. Issues addressed include an out of bounds access vulnerability. Full Article
y Red Hat Security Advisory 2020-1378-01 By packetstormsecurity.com Published On :: Tue, 07 Apr 2020 16:42:04 GMT Red Hat Security Advisory 2020-1378-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include a use-after-free vulnerability. Full Article
y Red Hat Security Advisory 2020-1352-01 By packetstormsecurity.com Published On :: Tue, 07 Apr 2020 16:42:20 GMT Red Hat Security Advisory 2020-1352-01 - Kernel-based Virtual Machine is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-ma packages provide the user-space component for running virtual machines that use KVM on the IBM z Systems, IBM Power, and 64-bit ARM architectures. Issues addressed include an out of bounds access vulnerability. Full Article
y Red Hat Security Advisory 2020-1372-01 By packetstormsecurity.com Published On :: Tue, 07 Apr 2020 16:42:47 GMT Red Hat Security Advisory 2020-1372-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a use-after-free vulnerability. Full Article
y Red Hat Security Advisory 2020-1358-01 By packetstormsecurity.com Published On :: Tue, 07 Apr 2020 16:43:19 GMT Red Hat Security Advisory 2020-1358-01 - Kernel-based Virtual Machine offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Issues addressed include an out of bounds access vulnerability. Full Article
y Red Hat Security Advisory 2020-1403-01 By packetstormsecurity.com Published On :: Wed, 08 Apr 2020 16:52:52 GMT Red Hat Security Advisory 2020-1403-01 - Kernel-based Virtual Machine is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM. Issues addressed include an out of bounds access vulnerability. Full Article
y Red Hat Security Advisory 2020-1460-01 By packetstormsecurity.com Published On :: Tue, 14 Apr 2020 15:40:41 GMT Red Hat Security Advisory 2020-1460-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. BR/EDR encryption key negotiation attacks were addressed. Full Article
y Red Hat Security Advisory 2020-1473-01 By packetstormsecurity.com Published On :: Tue, 14 Apr 2020 23:02:22 GMT Red Hat Security Advisory 2020-1473-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a buffer overflow vulnerability. Full Article
y Red Hat Security Advisory 2020-1465-01 By packetstormsecurity.com Published On :: Wed, 15 Apr 2020 00:12:24 GMT Red Hat Security Advisory 2020-1465-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a buffer overflow vulnerability. Full Article
y Red Hat Security Advisory 2020-1493-01 By packetstormsecurity.com Published On :: Thu, 16 Apr 2020 15:34:41 GMT Red Hat Security Advisory 2020-1493-01 - The kernel-alt packages provide the Linux kernel version 4.x. Issues addressed include buffer overflow, denial of service, heap overflow, and null pointer vulnerabilities. Full Article
y Red Hat Security Advisory 2020-1505-01 By packetstormsecurity.com Published On :: Tue, 21 Apr 2020 13:53:17 GMT Red Hat Security Advisory 2020-1505-01 - Kernel-based Virtual Machine is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-ma packages provide the user-space component for running virtual machines that use KVM on the IBM z Systems, IBM Power, and 64-bit ARM architectures. An out-of-bounds heap access vulnerability was addressed. Full Article
y Red Hat Security Advisory 2020-1524-01 By packetstormsecurity.com Published On :: Wed, 22 Apr 2020 15:10:47 GMT Red Hat Security Advisory 2020-1524-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a buffer overflow vulnerability. Full Article
y Red Hat Security Advisory 2020-1769-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:19:01 GMT Red Hat Security Advisory 2020-1769-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include denial of service, information leakage, integer overflow, null pointer, out of bounds read, and use-after-free vulnerabilities. Full Article
y Red Hat Security Advisory 2020-1966-01 By packetstormsecurity.com Published On :: Wed, 29 Apr 2020 15:56:45 GMT Red Hat Security Advisory 2020-1966-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a use-after-free vulnerability. Full Article
y Qualys Security Advisory - OpenBSD Authentication Bypass / Privilege Escalation By packetstormsecurity.com Published On :: Thu, 05 Dec 2019 21:08:17 GMT Qualys has discovered that OpenBSD suffers from multiple authentication bypass and local privilege escalation vulnerabilities. Full Article
y Qualys Security Advisory - OpenBSD Dynamic Loader Privilege Escalation By packetstormsecurity.com Published On :: Thu, 12 Dec 2019 13:39:44 GMT Qualys discovered a local privilege escalation in OpenBSD's dynamic loader (ld.so). This vulnerability is exploitable in the default installation (via the set-user-ID executable chpass or passwd) and yields full root privileges. They developed a simple proof of concept and successfully tested it against OpenBSD 6.6 (the current release), 6.5, 6.2, and 6.1, on both amd64 and i386; other releases and architectures are probably also exploitable. Full Article
y OpenBSD Dynamic Loader chpass Privilege Escalation By packetstormsecurity.com Published On :: Fri, 27 Dec 2019 21:27:23 GMT This Metasploit module exploits a vulnerability in the OpenBSD ld.so dynamic loader (CVE-2019-19726). The _dl_getenv() function fails to reset the LD_LIBRARY_PATH environment variable when set with approximately ARG_MAX colons. This can be abused to load libutil.so from an untrusted path, using LD_LIBRARY_PATH in combination with the chpass set-uid executable, resulting in privileged code execution. This module has been tested successfully on OpenBSD 6.1 (amd64) and OpenBSD 6.6 (amd64). Full Article
y OAIC Received 114 Voluntary Data Breach Notifications In Two Years By packetstormsecurity.com Published On :: Thu, 19 Oct 2017 14:16:59 GMT Full Article headline hacker privacy australia data loss
y Australia Likely To Get Its Own GDPR By packetstormsecurity.com Published On :: Fri, 03 Nov 2017 14:20:15 GMT Full Article headline government privacy australia data loss
y Australia's War On Encryption Potentially 'Reckless' By packetstormsecurity.com Published On :: Mon, 06 Nov 2017 14:22:57 GMT Full Article headline government privacy australia cryptography
y Buy Second Hand Furniture To Learn Australian Govt Secrets By packetstormsecurity.com Published On :: Wed, 31 Jan 2018 17:01:23 GMT Full Article headline government privacy australia data loss
y Security Consultant Granted Bail After Hacking GoGet Systems By packetstormsecurity.com Published On :: Thu, 01 Feb 2018 01:07:35 GMT Full Article headline hacker australia
y Russian Blame For NotPetya Was Diplomatic Action By packetstormsecurity.com Published On :: Thu, 12 Apr 2018 15:51:57 GMT Full Article headline government malware russia australia cyberwar
y Huawei Rejects Australia Security Concerns By packetstormsecurity.com Published On :: Mon, 18 Jun 2018 16:07:15 GMT Full Article headline government australia china flaw cyberwar backdoor
y The Internet Reacts To Australia's Anti-Encryption Bill By packetstormsecurity.com Published On :: Thu, 06 Dec 2018 19:56:43 GMT Full Article headline government australia backdoor
y Australia Passes Encryption-Breaking Laws By packetstormsecurity.com Published On :: Fri, 07 Dec 2018 17:30:55 GMT Full Article headline government privacy australia backdoor cryptography
y Early Warning System In Australia Breached And Abused By packetstormsecurity.com Published On :: Mon, 07 Jan 2019 15:58:15 GMT Full Article headline hacker government australia
y Australian Parliament Targeted By Unknown Hacker By packetstormsecurity.com Published On :: Sat, 09 Feb 2019 14:34:32 GMT Full Article headline hacker government australia cyberwar password
y Australian Political Parties Hit By State Actor Hack By packetstormsecurity.com Published On :: Mon, 18 Feb 2019 15:40:02 GMT Full Article headline hacker government australia cyberwar