CVE-2018-18500: Heap write-after-free in Firefox, Analysis and Exploitation

Credit to Author: Yaniv| Date: Thu, 18 Apr 2019 15:35:40 +0000

Editor&#8217;s note: This article is a technical description of a bug discovered by a member of the Offensive Research team at SophosLabs, and how the researcher created a proof-of-concept &#8220;Arbitrary Read/Write Primitive&#8221; exploit for this bug. The vulnerability was deemed critical by Mozilla&#8217;s bug tracking team and was patched in Firefox 65.0. It&#8217;s written for [&#8230;]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/oTcYk6i594c” height=”1″ width=”1″ alt=””/>

Read more

Protected: CVE-2018-18500: Heap write-after-free in Firefox, Analysis and Exploitation

Credit to Author: Yaniv| Date: Thu, 18 Apr 2019 15:35:40 +0000

Editor&#8217;s note: This article is a technical description of a bug discovered by a member of the Offensive Research team at SophosLabs, and how the researcher created a proof-of-concept &#8220;Arbitrary Read/Write Primitive&#8221; exploit for this bug. The vulnerability was deemed critical by Mozilla&#8217;s bug tracking team and was patched in Firefox 65.0. It&#8217;s written for [&#8230;]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/oTcYk6i594c” height=”1″ width=”1″ alt=””/>

Read more

Explained: like-farming

Credit to Author: Pieter Arntz| Date: Thu, 18 Apr 2019 15:00:00 +0000

Like-farming is a popular method on social media to harvest as many likes and shares as possible in order to increase the value of a site or domain. But what happens when scammers get in the game?

Categories:

Tags:

(Read more…)

The post Explained: like-farming appeared first on Malwarebytes Labs.

Read more

This Week in Security News: Medical Malware and Monitor Hacks

Credit to Author: Jon Clay (Global Threat Communications)| Date: Thu, 18 Apr 2019 13:00:42 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn how baby monitors may be susceptible to hacking. Also, learn about a medical flaw that enables hackers to hide malware. Read on: Is Your Baby Monitor…

The post This Week in Security News: Medical Malware and Monitor Hacks appeared first on .

Read more

5 ways to instantly detect a phishing email and save yourself from phishing attack

Credit to Author: Sushmita Kalashikar| Date: Thu, 18 Apr 2019 11:06:17 +0000

Phishing is a fraudulent activity to trick you into revealing your personal and confidential information. This information usually includes bank account details, net banking details, credit/debit card numbers, login ID and passwords. Every day, countless people become unsuspecting victims of phishing attacks. With cyber criminals adopting sophisticated modes of phishing…

Read more