Remove Analysis Remove Encryption Remove Libraries Remove Video
article thumbnail

Telegram flaw could have allowed access to users secret chats

Security Affairs

Experts at Shielder disclosed a flaw in the Telegram app that could have exposed users’ secret messages, photos, and videos to remote attackers. The experts discovered that sending a sticker to a Telegram user could have exposed his secret chats, photos, and videos to remote attackers. ” continues the report.

Access 116
article thumbnail

New PyLocky Ransomware stands out for anti-machine learning capability

Security Affairs

” reads hte analysis published by Trend Micro. ” Experts warn of its ability to bypass static analysis methods due to the combined use of Inno Setup Installer and PyInstaller. exe will drop malware components — several C++ and Python libraries and the Python 2.7 When successfully run, the Facture_23100.31.07.2018.exe

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

YTStealer info-stealing malware targets YouTube content creators

Security Affairs

To control the browser, the malware uses a library called Rod. The malware encrypts all the data with a key that is unique for each sample and sends it along with a sample identifier to the C2 server located at the domain name youbot[.]solutions. Aparat is an Iranian video-sharing site that was founded in 2011.

article thumbnail

InvisiMole group targets military sector and diplomatic missions in Eastern Europe

Security Affairs

” reads the analysis published by ESET. The SMInit exploit chain exploits a vulnerability in the legitimate Total Video Player software. It exploits a vulnerability in the Windows wdigest.dll library and then uses an improved ListPlanting technique to inject its code into a trusted process.

article thumbnail

Infecting Canon EOS DSLR camera with ransomware over the air

Security Affairs

.” states the post published by the expert, who shared the following video PoC. The expert focused his analysis in PTP layer that supports 148 commands, 38 of them receive an input buffer. Searching for a PTP Python library, we found ptpy , which didn’t work straight out of the box, but still saved us important time in our setup.”

article thumbnail

The Hacker Mind Podcast: Fuzzing Crypto

ForAllSecure

Guido Vranken returns to The Hacker Mind to discuss his CryptoFuzz tool on GitHub, as well as his experience fuzzing and finding vulnerabilities in cryptographic libraries and also within cryptocurrencies such as Ethereum. Fortunately, in this episode, we’re discussing vulnerabilities in both. It’s not a secret.

article thumbnail

Weekly Vulnerability Recap – October 2, 2023 –  WS_FTP, Exim, Cisco and Other Exploited Vulnerabilities

eSecurity Planet

As always, our pressured IT and security teams will need to use severity ratings in combination with a risk analysis of assets potentially exposed by vulnerabilities to determine priorities and schedules. encryption and to contact vendors about possible issues and fixes for their encryption algorithms.