Remove tag mozilla
article thumbnail

Google links three exploitation frameworks to Spanish commercial spyware vendor Variston

Security Affairs

Google’s Threat Analysis Group (TAG) linked three exploitation frameworks to a Spanish surveillance spyware vendor named Variston. While tracking the activities of commercial spyware vendors, Threat Analysis Group (TAG) spotted an exploitation framework likely linked Variston IT, a Spanish firm. ” TAG concludes.

Archiving 100
article thumbnail

North Korea-linked threat actors target cybersecurity experts with a zero-day

Security Affairs

The attacks that took place in the past weeks were detected by researchers at Google’s Threat Analysis Group (TAG). “Recently, TAG became aware of a new campaign likely from the same actors based on similarities with the previous campaign. ” reads the advisory published by Google TAG.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Tor Project released Tor Browser 8.5.1 for Windows, Mac, Linux, and Android

Security Affairs

Bug 29969 : Remove workaround for Mozilla’s bug 1532530 Update HTTPS Everywhere to 2019.5.13 Bug 29969 : Remove workaround for Mozilla’s bug 1532530 Update HTTPS Everywhere to 2019.5.13 Bwloe the full changelog since Tor Browser 8.5: All platforms Update Torbutton to 2.1.10 All platforms Update Torbutton to 2.1.10

article thumbnail

Security Affairs newsletter Round 357 by Pierluigi Paganini

Security Affairs

Is it fake news? CVE-2022-0492 flaw in Linux Kernel cgroups feature allows container escape Charities and NGOs providing support in Ukraine hit by malware.

article thumbnail

Flaw in Zoom video conferencing software lets sites take over webcam on Mac

Security Affairs

All the attacker need to do is to create an invite link through his account on the Zoom website and embed it on a website as an image tag or using an iFrame. Only the following links seem to be important: action=join confno=[whatever the conference number is]. Then he needs to trick the victims into visiting the malicious website.

article thumbnail

Davos?

Daradiction

Past recipients of this recognition include Google, Business Objects, Mozilla and Dr Reddy’s Laboratories, among others. Tags: Technology Uncategorized. In addition, it must demonstrate visionary leadership, show the signs of being a long-standing market leader, and its technology must be proven.

article thumbnail

Why No HTTPS? Questions Answered, New Data, Path Forward

Troy Hunt

Is an HTTP 200 and a meta refresh tag or some funky JS sufficient? As you'll see from the Mozilla articles I linked to on those status codes, this has an impact on SEO. Meta refresh tags and client-side script are not "correct" implementations of redirects from insecure to secure schemes.

IT 50