SecureBug allows you to evaluate your offensive and defensive skills, in addition, to let you exchange your ideas and methodologies with thousands of people in the security field.
Join Nordic's No.1 Crowdsourced Security Platform For Offensive & Defensive Security Strategies.

Mozilla Firefox Logo

Mozilla releases security patches for Firefox critical vulnerabilities exploited in the wild

Mozilla patched two critical zero-days in Firefox 74.0.1. The vulnerabilities were exploited in the wild through targeted attacks. Mozilla is now urging users to update their Firefox browsers to fix the two bugs. The two vulnerabilities, tracked as CVE-2020-6819 and CVE-2020-6820, are both use-after-free. Use-after-free flaws are a type of memory corruption that could lead…

wininit.exe Windows process

wininit.exe: One Of The Most Important Windows Processes For Threat Hunting

“wininit.exe” stands for Windows Initialization. This process is an essential part of the Windows OS and it runs in the background. “wininit.exe” is responsible for launching the Windows Initialization process. In this new series, we analyze Windows processes and provide threat hunting tips. This process’s primary function is launching the majority of the background applications that are…

Detect Malicious Screensaver Files (SCR) with Sigma Detection Rule

Detect Malicious Screensaver Files (SCR) with Sigma Detection Rule

[vc_row][vc_column][vc_column_text]Watch out for screensavers; they could contain malicious files. Attackers can use malicious screensaver files to save their access on the systems; screensavers are programs that execute after a configurable time of user inactivity and consist of Portable Executable (PE) files with a .scr file extension. With this free sigma rule you can detect executed…

vulnerabilities in WordPress SEO plugin - Rank Math

Vulnerabilities in WordPress SEO Plugin Modify Administrative Access, Create Malicious Redirects on Site

WordPress security plugin, Wordfence, discovered two high severity vulnerabilities in the WordPress SEO Plugin – Rank Math. The vulnerabilities, if exploited, allow unauthorized attackers to grant or revoke administrative privileges or lock admins out. The privilege escalation vulnerability in the WordPress SEO plugin, Rank Math, allows attackers to grant administrative access to any registered user…

Zoom logo

Zoom Vulnerability Allows Hackers to Steal Windows Passwords

Zoom is a videoconferencing software that has had an increase in popularity since the COVID-19 outbreak started. It has over 74,000 customers and 13 million monthly active users. The software company provides its customers with a cloud-based communication platform that offers chat, audio and video conferencing, online meetings via mobile, desktop, and telephone systems. Although…

Marriott data breach

Marriott International Discloses Data Breach Affecting 5.2 Million Guests

Marriott International disclosed that the personal information of 5.2 million guests was affected by a data breach that started in mid-January 2020. At the end of February 2020, Multinational hotel chain Marriott detected that the personal information of approximately 5.2 million guests may have been leaked through the third-party application they use to provide guest…