Projekt Ghostbusters: Die schockierende Wahrheit über das heimtückische Snapchat-Spionageprogramm von Meta.Der Artikel Projekt Ghostbusters: Meta’s „Geisterjagd“ bei Snapchat erschien zuerst auf Tarnkappe.info
Read more...Kunden von Comdirect erhalten derzeit massenweise eine E-Mail, in der sie dringend zur Handlung innerhalb von 24 Stunden aufgerufen werden.Der Artikel Comdirect-Phishing zielt auf PhotoTan-Verfahren ab erschien zuerst auf Tarnkappe.info
Read more...Die Ukraine verstärkt ihren Kampf gegen Online-Piraterie und Piraterie-Plattformen durch die Teilnahme am WIPO ALERT-Programm.Der Artikel Ukraine tritt WIPO ALERT bei: Das Urheberrechtssystem wird reformiert erschien zuerst auf Tarnkappe.info
Read more...MFA-Bombing-Attacken: Eine neue Phishing-Bedrohung für Apple-Nutzer. Was steckt dahinter und wie kann man sich schützen?Der Artikel MFA Bombing-Welle trifft Apple-Nutzer: Angreifer wollen Accounts übernehmen erschien zuerst auf Tarnkappe.info
Read more...Die KI Balefire überprüft Videoaufnahmen dahingehend, ob Personen dort rauchen, wo es verboten ist. Dabei stellt man auch die Identität fest.Der Artikel Balefire: Mit Kameraüberwachung und KI Raucher erwischen erschien zuerst auf Tarnkappe.info
Read more...Operation 404 erzielt einen wichtigen Erfolg gegen IPTV-Piraterie. Der Betreiber von Flash IPTV wird zu fünf Jahren Haft verurteilt.Der Artikel Flash IPTV: Betreiber zu mehr als fünf Jahren Haft verurteilt erschien zuerst auf Tarnkappe.info
Read more...Das FBI hat YouTube angewiesen, ihnen wegen Geldwäsche die Daten von YouTube-Nutzern zu übergeben. Das Video wurde über 30.000 Mal angesehen.Der Artikel YouTube soll wegen Geldwäsche seine Nutzer offenbaren erschien zuerst auf Tarnkappe.info
Read more...Europol in der Krise. Eine riesige Datenpanne erschüttert die europäische Strafverfolgungsbehörde mit Sitz in Den Haag.Der Artikel Datenpanne bei Europol: Sensible Unterlagen verschwunden erschien zuerst auf Tarnkappe.info
Read more...Diverse Krypto-Investoren fiebern in diesem Frühjahr einem besonderen Ereignis entgegen: Bitcoin-Halving. Doch was ist das eigentlich?Der Artikel Zukunft der Kryptowährungen: Wie Halvings den Markt beeinflussen erschien zuerst auf Tarnkappe.info
Read more...Mit der Veröffentlichung des Quellcodes auf GitHub erreicht die Diskussion um die Anti-Piraterie-Plattform Piracy Shield eine neue Dimension.Der Artikel Piracy Shield Leak: Interne Dokumentation auf GitHub veröffentlicht erschien zuerst auf Tarnkappe.info
Read more...Nachdem man in Italien kürzlich mehrfach falsche Seiten blockiert hat, traf es jetzt 15 fehlerhafte IP-Adressen des CDN-Anbieters Akamai.Der Artikel Akamai von falschen Sperren des Piracy Shields betroffen erschien zuerst auf Tarnkappe.info
Read more...Eine Studie der Alliance for Creativity and Entertainment ergab, dass von Piraten-Websites das größte Risiko einer Malware-Infektion ausgeht.Der Artikel Studie: Piraterieseiten als größtes Verbraucherrisiko erschien zuerst auf Tarnkappe.info
Read more...Spanische Telegram-Nutzer können vorläufig aufatmen: Die Telegram-Blockade wurde von Richter Santiago Pedraz vorerst ausgesetzt.Der Artikel Telegram-Blockade in Spanien vorerst ausgesetzt erschien zuerst auf Tarnkappe.info
Read more...Wie kann ich im Ausland mit dem Apple TV auf heimische Inhalte zugreifen? Ganz einfach, dafür nutzt man PureVPN oder einen anderen Anbieter.Der Artikel Wie kann ich PureVPN auf Apple TV nutzen? erschien zuerst auf Tarnkappe.info
Read more...Es tut sich was im digitalen Untergrund. Vor wenigen Wochen öffneten die Admins die Tore des neuen deutschsprachigen Forums tv-base.net.Der Artikel tv-base.net – weiteres Forum für Cardsharing und IPTV eröffnet erschien zuerst auf Tarnkappe.info
Read more...Der Umstieg von Adobe Acrobat auf UPDF hilft dabei, den heutigen Bedürfnissen gerecht zu werden. Außerdem ist es deutlich preiswerter.Der Artikel PDF-Editor: Warum sollte man von Adobe Acrobat zu UPDF wechseln? erschien zuerst auf Tarnkappe.info
Read more...Mit tv-world.io wurde eine neue deutschsprachige IPTV- & Cardsharing-Community eröffnet. Doch das Forum ist aktuell leider noch nicht sicher.Der Artikel tv-world.io – neues IPTV- & Cardsharing-Forum ging ans Netz erschien zuerst auf Tarnkappe.info
Read more...Vor ein paar Tagen ging mit Weedmarket.to ein neues Forum für den Handel mit Cannabis & Co. ans Netz. Harte Drogen sind dort verboten.Der Artikel Weedmarket.to – neues Cannabisforum eröffnet erschien zuerst auf Tarnkappe.info
Read more...Wie es um Digitalisierung, Cybersicherheit und Infrastruktur in Deutschland wirklich bestellt ist, klären unsere heutigen Lesetipps.Der Artikel Lesetipps: Von einer IT, die aus der Hölle kam erschien zuerst auf Tarnkappe.info
Read more...Spanien blockiert den Telegram-Messenger wegen der illegalen Verbreitung von Inhalten und Ermittlungen zu Urheberrechtsverletzungen.Der Artikel Spanien blockiert Telegram wegen Urheberrechtsverletzungen erschien zuerst auf Tarnkappe.info
Read more...Red Hat Security Advisory 2024-1554-03 - An update for.NET 6.0 is now available for Red Hat Enterprise Linux 8. Issues addressed include a denial of service vulnerability.
Read more...Red Hat Security Advisory 2024-1555-03 - An update for.NET 6.0 is now available for Red Hat Enterprise Linux 9. Issues addressed include a denial of service vulnerability.
Read more...Red Hat Security Advisory 2024-1557-03 - An update is now available for Red Hat OpenShift Builds 1.0. Issues addressed include denial of service and traversal vulnerabilities.
Read more...Red Hat Security Advisory 2024-1544-03 - An update for dnsmasq is now available for Red Hat Enterprise Linux 8.8 Extended Update Support.
Read more...Red Hat Security Advisory 2024-1545-03 - An update for dnsmasq is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Issues addressed include a use-after-free vulnerability.
Read more...Red Hat Security Advisory 2024-1549-03 - Updated images are now available for Red Hat Advanced Cluster Security. The updated image includes bug and security fixes. Issues addressed include a traversal vulnerability.
Read more...Red Hat Security Advisory 2024-1552-03 - An update for.NET 6.0 is now available for Red Hat Enterprise Linux 9. Issues addressed include a denial of service vulnerability.
Read more...Red Hat Security Advisory 2024-1553-03 - An update for.NET 6.0 is now available for Red Hat Enterprise Linux 8. Issues addressed include a denial of service vulnerability.
Read more...Red Hat Security Advisory 2024-1538-03 - An update for cnf-tests-container, dpdk-base-container, performance-addon-operator-must-gather NUMA-aware secondary scheduler, numaresources-operator is now available for Red Hat OpenShift Container Platform 4.12.
Read more...Red Hat Security Advisory 2024-1543-03 - An update for dnsmasq is now available for Red Hat Enterprise Linux 9.0 Extended Update Support.
Read more...Red Hat Product Security has joined forces with other security teams inside Red Hat to publish our content in a common venue using the Security channel of the Red Hat Blog.This move provides a wider variety of important Security topics,[…]
Read more...Red Hat Product Security has transitioned from using its old 1024-bit DSA OpenPGP key to a new 4096-bit RSA OpenPGP key.This was done to improve the long-term security of our communications with our customers and also to meet current key[…]
Read more...As part of Red Hat's commitment to product security we have developed a tool internally that can be used to scan for variant 1 SPECTRE vulnerabilities. As part of our commitment to the wider user community, we are introducing this[…]
Read more...Last week, a vulnerability (CVE-2018-10892) that affected CRI-O, Buildah, Podman, and Docker was made public before some affected upstream projects were notified. We regret that this was not handled in a way that lives up to our own standards around[…]
Read more...This year’s Red Hat Summit will be held on May 8-10 in beautiful San Francisco, USA.Product Security will be joining many Red Hat security experts in presenting and assisting subscribers and partners at the show.Here is a sneak peek at[…]
Read more...Google has announced that on April 30, 2018, Chrome will:“...require that all TLS server certificates issued after 30 April, 2018 be compliant with the Chromium CT Policy. After this date, when Chrome connects to a site serving a publicly-trusted certificate[…]
Read more...For those who aren’t familiar with Payment Card Industry Data Security Standard (PCI-DSS), it is the standard that is intended to protect our credit card data as it flows between systems and is stored in company databases.PCI-DSS requires that all[…]
Read more...It is a tale as old as time.Developers and security personnel view each other withsuspicion.The perception is that a vast gulf of understanding and ability lies between the two camps.“They can’t possibly understand what it is to do my job!”[…]
Read more...Red Hat JBoss Enterprise Application Platform (EAP) is a commonly used host for Restful webservices. A powerful but potentially dangerous feature of Restful webservices on JBoss EAP is the ability to accept any media type. If not configured to accept[…]
Read more...Today, a security issue called BlueBorne was disclosed, a vulnerability that could be used to attack sensitive systems via the Bluetooth protocol. Specifically, BlueBorne is a flaw where a remote (but physically quite close) attacker could get root on a[…]
Read more...There exists an unauthenticated command injection vulnerability in the QNAP operating system known as QTS and QuTS hero. QTS is a core part of the firmware for numerous QNAP entry and mid-level Network Attached Storage (NAS) devices, and QuTS hero[…]
Read more...Nikto is an Open Source web server scanner which performs comprehensive tests against web servers for multiple items, including over 3500 potentially dangerous files/CGIs, versions on over 900 servers, and version specific problems on over 250 servers.
Read more...R Radio Network FM Transmitter version 1.07 suffers from an improper access control that allows an unauthenticated actor to directly reference the system.cgi endpoint and disclose the clear-text password of the admin user allowing authentication bypass and FM station setup[…]
Read more...Electrolink FM/DAB/TV Transmitter from a denial of service scenario. An unauthenticated attacker can reset the board as well as stop the transmitter operations by sending one GET request to the command.cgi gateway.
Read more...An unauthenticated remote code execution vulnerability exists in the embedded webserver in certain Lexmark devices through 2023-02-19. The vulnerability is only exposed if, when setting up the printer or device, the user selects "Set up Later" when asked if they[…]
Read more...Tinycontrol LAN Controller version 3 suffers from an unauthenticated remote denial of service vulnerability. An attacker can issue direct requests to the stm.cgi page to reboot and also reset factory settings on the device.
Read more...This Metasploit module exploits authentication bypass (CVE-2018-17153) and command injection (CVE-2016-10108) vulnerabilities in Western Digital MyCloud before 2.30.196 in order to achieve unauthenticated remote code execution as the root user. The module first performs a check to see if the[…]
Read more...Ubuntu Security Notice 6181-1 - Hiroshi Tokumaru discovered that Ruby did not properly handle certain user input for applications the generate HTTP responses using cgi gem. An attacker could possibly use this issue to maliciously modify the response a user[…]
Read more...SecurePoint UTM versions 12.x suffers from a memory leak vulnerability via the spcgi.cgi endpoint.
Read more...SecurePoint UTM versions 12.x suffers from a session identifier leak vulnerability via the spcgi.cgi endpoint.
Read more...snaplitics made a real revolution in the industry.
The util-linux wall command does not filter escape sequences from command line arguments. The vulnerable code was introduced in commit cdd3cc7fa4 (2013). Every version since has been vulnerable. This allows unprivileged users to put arbitrary text on other users terminals,[…]
Read more...Ubuntu Security Notice 6714-1 - It was discovered that debmany in Debian Goodies incorrectly handled certain deb files. An attacker could possibly use this issue to execute arbitrary shell commands.
Read more...Debian Linux Security Advisory 5645-1 - Manfred Paul discovered a flaw in the Mozilla Firefox web browser, allowing an attacker to inject an event handler into a privileged object that would allow arbitrary JavaScript execution in the parent process.
Read more...Debian Linux Security Advisory 5646-1 - Multiple security vulnerabilities have been discovered in Cacti, a web interface for graphing of monitoring systems, which could result in cross-site scripting, SQL injection, or command injection.
Read more...Debian Linux Security Advisory 5647-1 - Several vulnerabilities have been discovered in Samba, a SMB/CIFS file, print, and login server for Unix, which might result in denial of service or information disclosure.
Read more...Debian Linux Security Advisory 5643-1 - Multiple security issues have been found in the Mozilla Firefox web browser, which could potentially result in the execution of arbitrary code or information disclosure, bypass of content security policies or spoofing.
Read more...Debian Linux Security Advisory 5644-1 - Multiple security issues were discovered in Thunderbird, which could result in denial of service, the execution of arbitrary code or leaks of encrypted email subjects.
Read more...Debian Linux Security Advisory 5642-1 - Three security issues were discovered in php-svg-lib, a PHP library to read, parse and export to PDF SVG files, which could result in denial of service, restriction bypass or the execution of arbitrary code.
Read more...Debian Linux Security Advisory 5626-2 - One of the upstream changes in the update released as DSA 5626 contained a regression in the zoneToCache function. Updated pdns-recursor packages are available to correct this issue.
Read more...Debian Linux Security Advisory 5641-1 - It was discovered that fontforge, a font editor, is prone to shell command injection vulnerabilities when processing specially crafted files.
Read more...A buffer overflow exists in the GNU C Library's dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. It has been dubbed Looney Tunables. This issue allows an local attacker to use maliciously crafted GLIBC_TUNABLES when launching binaries with SUID[…]
Read more...GNOME Files version 43.4 (nautilus) on Fedora 37 will extract zip archives with setuid files for other user identifiers that can be leveraged to escalate privileges.
Read more...This Metasploit module exploits a vulnerability in RedHat based systems where improper file permissions are applied to /usr/lib/tmpfiles.d/tomcat.conf for Apache Tomcat versions before 7.0.54-8. The configuration files in tmpfiles.d are used by systemd-tmpfiles to manage temporary files including their creation.[…]
Read more...Qualys discovered a size_t-to-int conversion vulnerability in the Linux kernel's filesystem layer: by creating, mounting, and deleting a deep directory structure whose total path length exceeds 1GB, an unprivileged local attacker can write the 10-byte string "//deleted" to an offset[…]
Read more...Fedora with Gnome has an issue where it is not using fscaps safely.
Read more...netkit-telnet version 0.17 telnetd on Fedora 31 BraveStarr remote code execution exploit.
Read more...This Metasploit module exploits a vulnerability in the rds_page_copy_user function in net/rds/page.c (RDS) in Linux kernel versions 2.6.30 to 2.6.36-rc8 to execute code as root (CVE-2010-3904). This module has been tested successfully on Fedora 13 (i686) kernel version 2.6.33.3-85.fc13.i686.PAE and[…]
Read more...Grub2 has grub2-set-bootflag setuid in the new Fedora release and has the ability to corrupt the environment.
Read more...This Metasploit module attempts to gain root privileges by exploiting a vulnerability in the staprun executable included with SystemTap version 1.3. The staprun executable does not clear environment variables prior to executing modprobe, allowing an arbitrary configuration file to be[…]
Read more...This Metasploit module exploits a vulnerability in Linux kernels 4.15.0 to 4.18.18, and 4.19.0 to 4.19.1, where broken uid/gid mappings between nested user namespaces and kernel uid/gid mappings allow elevation to root (CVE-2018-18955). The target system must have unprivileged user[…]
Read more...Read more...
Read more...
Read more...
Read more...
Read more...
K2 is the popular powerful content extension for Joomla with CCK-like features. It provides an out-of-the box integrated solution featuring rich content forms for items (think of Joomla articles with additional fields for article images, videos, image galleries and attachments),[…]
Read more...Today we're launching Quick Menu, a new free admin module for Joomla 4 which adds a handy top-side (desktop) or bottom-side (mobile) menu in the Joomla 4 backend. The purpose of Quick Menu is to restore UX sanity & reduce[…]
Read more...Quick Menu (by JoomlaWorks) is a Joomla 4 administrator module which adds a handy quick menu to the Joomla 4 backend to restore UX sanity! FEATURES Less clicks to important content management and admin tasks in the Joomla 4 backend...[…]
Read more...Adding image galleries inside your Joomla articles has never been easier! Using the "Simple Image Gallery PRO" extension from JoomlaWorks you can quickly display a folder of images on your server as a stylish image gallery within any Joomla article,[…]
Read more...Disqus Comments (for Joomla) integrates the Disqus comments system & service into any Joomla based website. Disqus (pronounced 'discuss') is a service and tool for web comments and discussions - currently the most popular comments-as-a-service provider worldwide. It makes commenting[…]
Read more...K2 v2.11 is now available to download for Joomla versions 1.5 to 3.x. This release adds new features, improves existing features, resolves various bugs and adds PHP 8 compatibility. If you're also wondering what's up with Joomla 4, read on... First[…]
Read more...Adding RSS/Atom syndicated content inside your Joomla website is now super-easy and simple with the 'Simple RSS Feed Reader' module from JoomlaWorks. All you have to do is add a few feeds to the module parameters, publish the module in[…]
Read more...Adding image galleries inside your Joomla articles is now super-easy and simple, using the magical "Simple Image Gallery" plugin for Joomla. The plugin can turn any folder of images located inside your Joomla website into a grid-style image gallery with[…]
Read more...AllVideos (by JoomlaWorks) is the universal media player for Joomla and a classic must-have extension for any Joomla based website. Use the plugin to easily embed video & audio content from all major 3rd party media providers (YouTube, Vimeo, Dailymotion,[…]
Read more...SocialConnect is the only Joomla extension that allows you to integrate your Joomla site with social networks and identity providers for user authentication, posting content directly to social networks and 3rd-party comment system integration. Features Let your users register to[…]
Read more...Now fully responsive & Joomla 1.5 - 3.x compatible! Frontpage SlideShow is the easiest & most eye-catching way to display your featured articles or products in your Joomla website. It creates an uber cool slideshow with text snippets laying on[…]
Read more...Simple Image Gallery (free) version 4.2 is now available to download. This is a maintenance release. Here's what's been added or changed in Simple Image Gallery (free) with the release of v4.2: Resolves fatal PHP error in Joomla 4 caused[…]
Read more...Simple Image Gallery Pro v3.9.1 is now available to download for subscribers. This is a minor bug-fix release following the release of version 3.9.0 a couple weeks ago. For a detailed look on the new features and changes in v3.9.0,[…]
Read more...Simple Image Gallery Pro v3.9.0 is now available to download for subscribers. It's both a bug-fix and new feature release. Here's what's been added or changed in Simple Image Gallery Pro with the release of v3.9.0: SIGPro will now read[…]
Read more...Today we're releasing version 3.9.0 of the Simple RSS Feed Reader module. This is a bugfix release. Here's what's been added or changed (in more detail) with the release of v3.9.0: Fix the installer for Joomla 3.x on new installations.[…]
Read more...Today we're releasing version 3.8.0 of the Simple RSS Feed Reader module. This new release brings back Joomla 1.5 support (by popular request), it introduces a new sub-template & changes the remote image resizing service from Mobify to Images.weserv.nl. Here's what's[…]
Read more...The performance of the default article system in Joomla really sucks big time, that's a well know fact. It''s actually one of the reasons we built K2 in the first place. And as we venture into Joomla 4 territory, instead[…]
Read more...A plugin for supporting K2 in sh404SEF.Use the plugin to configure K2 URLs when using sh404SEF in a multitude of options.Unlike the previous built-in implementation for sh404SEF, this new plugin provides new URL manipulation options and it has dual compatibility[…]
Read more...The K2 Plugin for sh404SEF version 1.6.0 is now available to download for subscribers. This is a bug fix release that addresses compatibility with K2 v2.10.3+ and improves support for PHP 7.x in general. Here's what's been added or changed in the K2[…]
Read more...Simple Image Gallery Pro v3.8.0 is now available to download for subscribers. This new release improves upon existing features, extends Flickr support to galleries (beyond albums/sets) and adds PHP 7.4 & Postgres compatibility. Here's what's been added or changed in Simple[…]
Read more...Version 6.1.0 of AllVideos is now available. This new release introduces support for Mixcloud embeds and improves support for PHP 7.4. Here's what's been added or changed in this new release of AllVideos: Added support for Mixcloud embeds. Just use[…]
Read more...K2 v2.10.3 is now available to download for Joomla versions 1.5 to 3.x. This is a maintenance & bugfix release, which refines the backend user interface (building upon the changes that were introduced with v2.10.0 to v2.10.2), improves client-size (frontend) caching & resolves broken auto-generated feeds[…]
Read more...K2 v2.10.2 is now available to download for Joomla versions 1.5 to 3.x. This is a maintenance & security release: it concludes the backend user interface changes that were introduced with v2.10.0 and is now 100% mobile-friendly and it also addresses[…]
Read more...As we're preparing to launch a new website for getk2.org, we have decided to make an important change in the K2 Extensions Directory (KED). We stopped accepting new entries for templates in the KED about 2 weeks ago and this[…]
Read more...K2 v2.10.1 is now available to download for Joomla versions 1.5 to 3.x. This is a maintenance release that addresses a few bugs that were introduced with v2.10.0 released a couple weeks ago and we urge everyone using v2.10.0 to[…]
Read more...K2 v2.10.0 is now available to download for Joomla versions 1.5 to 3.x. This release introduces a refreshed backend design as well as feature improvements or additions (like Google Structured Data) and as always, performance improvements everywhere.To install K2 for[…]
Read more...K2 v2.9.0 is now available to download for Joomla 1.5 to 3.x. In short, this release improves compatibility with the latest releases of Joomla 3.8.x & improves frontend performance overall.To install K2 for the first time or update your existing[…]
Read more...K2 v2.8.0 is now available to download for Joomla 1.5 to 3.x. This release improves the content management workflow and UI, is fully compatible with PHP 7.x and the latest Joomla 3.7.x, while at the same time addressing various issues from[…]
Read more...K2 v2.7.1 is now available to download for Joomla 1.5 to 3.x. This is a minor release addressing various issues from performance to UI, to bug fixes and security.To install K2 for the first time or update your existing K2[…]
Read more...Start your update engines! K2 v2.7.0 is now available to download for Joomla 1.5 to 3.x. With a new improved user interface for the component in the Joomla backend, updated and now responsive-friendly default HTML overrides, Joomla 3.5 support, PHP[…]
Read more...