-
The local privilege-escalation (LPE)
#0day bug in#Microsoft
Task Scheduler, disclosed in late May by way of making public a fully functioning exploit, now has a micropatch.https://threatpost.com/zero-day-sandboxescaper-windows-fix/145337/?utm_source=twitter&utm_medium=social&utm_campaign=us_threatpost_Zt0106_organic&utm_content=sm-post&utm_term=us_twitter_organic_Zt0106_sm-post_social_threatpost … -
#SandboxEscaper#0day Polarbearrepo backup file is here :) https://mega.nz/#F!SlUkgSyA!cxLFsHeEjf36pYFqknPoLg … -
Impersonating: Microsoft Support
Microsoft decided not to patch it, so I'll post details tomorrow evening.
#0day#mssupportpic.twitter.com/jx6WF75APQ
-
0001
#iOneZero Thank You 4 The World You Made 4 Me.
#0day https://youtu.be/VOAniMMKtbQ -
MaXery Ransomware will be released soon ! http://MultiHexbook.py is online ,will be released on "5/June" Stay tuned boys !
@malwrhunterteam#0day -
I’ll include only Equation Group payloads that aren’t
#0day -
Researcher reveals Apple
#macos#0day bug which allows#hackers to mimic mouse-clicks to allow malicious behavior on Mojave. Don't leave your Macs unprotected: https://kas.pr/xp9b https://threatpost.com/macos-zero-day-malicious-code/145259/?utm_source=twitter&utm_medium=social&utm_campaign=us_threatpost_Zt0106_organic&utm_content=sm-post&utm_term=us_twitter_organic_Zt0106_sm-post_social_threatpost … -
Check out part 2 (The SBX) of the blog post by
@ax330d for his winning Pwn2Own entry on Edge https://blog.exodusintel.com/2019/05/27/pwn2own-2019-microsoft-edge-sandbox-escape-cve-2019-0938-part-2/ …#pwn2own#vulnerability#exploit#0day -
RT TheHackersNews "Newy Disclosed
#0Day Flaw in Apple's#macOS Mojave Lets Hackers Bypass Security and Privacy Protection Features with Synthetic Clicks…. Again! https://thehackernews.com/2019/06/macOS-synthetic-click.html … —Written by Swati_THN | Discovered by patrickwardle https://twitter.com/TheHackersNews/status/1135580395469074433/photo/1pic.twitter.com/va1arRrYsz " Stay up-t… -
#macOS#0Day On Mojave, there is a validation flaw in the way macOS checks the integrity of whitelisted apps. The operating system checks the existence of an app's digital certificate but fails to validate if the app has been tampered with. pic.twitter.com/Ej51Un3nVs
Show this thread -
Your Tweet activity Your Tweets earned 29,772 impressions over the last 24 hours
#earn#thelast#hours#impressions#tweets#earned#NEUROMASTER#Tweets#0day pic.twitter.com/5EC3RhFOBm
Show this thread -
-
Another Task Scheduler
#0day, Another Task Scheduler Micropatch (The#SandboxEscaper Saga) https://blog.0patch.com/2019/06/another-task-scheduler-0day-another.html … -
Countdown
#0day to go...#MonthEnds#MayEnds.#JuneBegins. -
RDP
#zeroday The flaw can be exploited to bypass the lock screen of a Windows machine, even when 2FA mechanisms such as Duo Security MFA are used. Other login banners an organization may set up are also bypassed.#0day https://www.bleepingcomputer.com/news/security/remote-desktop-zero-day-bug-allows-attackers-to-hijack-sessions/?_hsenc=p2ANqtz--weMWh_MpnHS1uQFmx0WdfaaZzSOjvo9zxQf8tjhrMv_Nsd_48YBGEAncgAfwff4mCjwaBJ0BkeKDrbuyI199u90e2txjRyBz4ybfMagRZiZstvUI … -
MacOS Zero-Day Allows Trusted Apps to Run Malicious Code Apple 0-Day allows hackers to mimic mouse-clicks to allow malicious behavior on macOS Majove, despite mitigations.
#macos#apple#0day#malware#hackinghttps://www.blackhatethicalhacking.com/macos-zero-day-allows-trusted-apps-run-malicious-code/ … -
#macOS#0day in ##Mojave about to drop via@patrickwardle
#OBTSpic.twitter.com/1UQsT8tzlx
-
-
#macOS#0Day Flaw Lets Hackers Bypass Security Features With Synthetic Clicks#Mojave@objective_see@patrickwardle https://thehackernews.com/2019/06/macOS-synthetic-click.html?fbclid=IwAR0zhr3cAzzIn5kyC01XybOaod7V5ih3wrO9f7H-tK2QX7YIDo5xxoWakww …Show this thread
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.