article thumbnail

3CX voice and video conferencing software victim of a supply chain attack

Security Affairs

Popular voice and video conferencing software 3CX was the victim of a supply chain attack, SentinelOne researchers reported. As of Mar 22, 2023, SentinelOne observed a spike in behavioral detections of the 3CXDesktopApp, which is a popular voice and video conferencing software product. ” explained 3CX’s CEO Nick Galea.

article thumbnail

Experts attribute WyrmSpy and DragonEgg spyware to the Chinese APT41 group

Security Affairs

Later variants masquerade as adult video content, “Baidu Waimai” food delivery platform, and Adobe Flash. These commands include instructing the malware to upload log files, photos stored on the device, and acquire device location using the Baidu Location library.” Most recent samples of DraginEgg are dated April 2023.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Recently fixed WinRAR bug actively exploited in the wild

Security Affairs

The flaw is an “Absolute Path Traversal” issue in the library that could be exploited to execute arbitrary code by using a specially-crafted file archive. The issue affects a third-party library, called UNACEV2.DLL DLL that is used by WINRAR, it resides in the way an old third-party library, called UNACEV2.DLL,

article thumbnail

Thousands of applications affected by a zero-day issue in jQuery File Upload plugin

Security Affairs

The jQuery File Upload is a jQuery widget “with multiple file selection, drag&drop support, progress bars, validation and preview images, audio and video.”. The plugin is widely adopted by numerous server-side platforms that support standard HTML form file uploads: PHP, Python, Ruby on Rails, Java, Node.js, Go, and others.

article thumbnail

Severe bug in LibreOffice and OpenOffice suites allows remote code execution

Security Affairs

By exploiting the vulnerability it is possible to trigger the automatic execution of a specific python library included in the suite using a hidden onmouseover event. The expert pointed out that the python file, named “pydoc.py,” is already included in the LibreOffice software. .

article thumbnail

BlackSquid malware uses multiple exploits to drop cryptocurrency miners

Security Affairs

“This malware, which we named BlackSquid after the registries created and main component file names, is particularly dangerous for several reasons.” “The miner in resource is the primary miner used, but it also determines if the targeted system has a video card. ” states Trend Micro.

Mining 64
article thumbnail

Mekel 2.0 Adds Features for Maximum Production Efficiencies

Info Source

. · OCR title naming (all models) : The optical character recognition (OCR) function recognizes title bar (microfiche) or title image (microfilm) text. View the Mekel Technology microfilm video or the microfiche video to see Mekel 2.0 in operation. Brochure: MACH 5, 10, 12 microfilm scanners.