#ZDI

2025-10-30

GIMP 3.0.6 verfügbar:
"Während unserer Entwicklung von GIMP 3.2", so beschreiben es die GIMPler:innen auf der Website, "haben wir zahlreiche Fehler und Regressionen gefunden und behoben. Viele dieser Bugfixes haben wir in diese stabile Version zurückportiert, sodass Sie nicht auf den kommenden Release‑Candidate von 3.2 warten müssen, um sie zu erhalten!" Drei der gefixten Bugs gehörten der Gefährdungskategorie "hoch" (7,8) an.
Ganz klar: Updaten!

gimp.org/news/2025/10/06/gimp-
noch mehr: gitlab.gnome.org/GNOME/gimp/-/

#gimp #bugfixes #infosec #BeDiS #ZDI

Screenshot Veröffentlichungshinweise GIMP 3.0.6

#AIP:
"
Ein Blick in das pulsierende Herz eines Sterns
"
"Ein Forschungsteam des Leibniz-Instituts für Astrophysik Potsdam (AIP) hat den magnetischen Herzschlag eines fernen Sterns entdeckt, der unserer Sonne bemerkenswert ähnlich ist – allerdings viel jünger und aktiver. .."

aip.de/de/news/heartbeat-of-a-

10.10.2025

#Astronomie #Astrophysik #ESO #FarBeyondTheSun #HARPS #IotaHorologii #Magnetfeld #Magnetzyklus #Schmetterlingsdiagramm #Stern #Sternentwicklung #ZDI

2025-09-14

manchmal vergess ich dass das zdf nun auch original tonspuren anbietet, das freut mich sehr. #zdi

2024-07-17

In May 2024, Trend Micro's Zero Day Initiative (ZDI) discovered a new vulnerability, CVE-2024-38112, being exploited by the Advanced Persistent Threat (APT) group known as Void Banshee. This vulnerability allowed attackers to execute malicious code on Windows systems by leveraging the MHTML protocol handler and x-usc directives through internet shortcut (.URL) files. Despite Internet Explorer being disabled on most modern Windows systems, Void Banshee found a way to use it to run malicious files, particularly targeting users with the Atlantida info-stealer malware. This malware is designed to steal sensitive data such as passwords and cookies from various applications.

Void Banshee distributed their malicious files disguised as PDFs within zip archives, tricking victims into thinking they were legitimate documents. These files were spread across cloud-sharing platforms, Discord servers, and online libraries, focusing their attacks primarily in North America, Europe, and Southeast Asia. The discovery of CVE-2024-38112 underscores the ongoing risk posed by outdated Windows features, even after official support has ended, serving as a reminder of the importance of keeping software up to date and vigilant about potential threats.

To mitigate this vulnerability, Microsoft released patches as part of the July 2024 Patch Tuesday, unregistering the MHTML handler from Internet Explorer to prevent future exploits.

trendmicro.com/en_us/research/

#cybersecurity #windows #internetexplorer #vulnerability #apt #voidbanshee #mhtml #protocol #url #malware #atlantida #pdf #zip #discord #servers #cve #trendmicro #zdi #patchtuesday

#ZDI 、組織的な #脆弱性 公開のまたしても大惨事で Microsoft を辱める」: The Register

「この欠陥は CVE-2024-38112 として追跡されており、MSHTML 別名 #Trident 、別名 Microsoft 独自の Internet Explorer 用ブラウザ エンジンに存在します。 Redmond は これをスプーフィングの脆弱性と呼び 、実際に悪用されていることを指摘し、CVSS 重大度スコア 10 点中 7.5 を割り当てました。

一方、ZDI は、これはリモートでコードが実行される欠陥であり、より厳しい評価を受ける可能性があると主張している。

「彼らは、私たちが報告したのは多層防御の修正だけだと主張していますが、その多層防御の修正が実際に何なのかは教えてくれません」とZDIの脅威認識責任者のダスティン・チャイルズ氏は The Registerに 語った。」

theregister.com/2024/07/15/zdi

#prattohome #TheRegister

Nenad S. LazichLazich
2024-06-24

Изложба плаката Само да (по)кажем!!! Ненада С. Лазића од 7. до 21. јуна 2024. године у галерији АЛУЗ, Суботићева 1, Зрењанин. Линк до каталога: app.box.com/s/uhaxjq1i75u5skjb

Nenad S. LazichLazich
2024-03-03

Joш 42 дана за пријаве на „Оригинал фалсификата - Типографски кирбајн”
Више на original-falsifikata.lazich.in

-kirbajn -falsifikata

2024-02-24

#zdi declaring #pwn2own automotive the most extensive use of #rfhackers they've seen , often for 6 figure bugs at #ringzer0

Neustradamus :xmpp: :linux:neustradamus
2023-10-15
Neustradamus :xmpp: :linux:neustradamus
2023-10-03
2023-10-03

For the record: Exim's response to The #ZDI
exim.org/static/doc/security/C
Fixes are available in Exim 4.96.1 and will be in 4.97 once released.

2023-09-21

#WarmUp für die @wueww am #cube des #zdi #wuerzburg

@Ute gibt ihre Eröffnungsrede. Wir freuen uns riesig!

WinRAR 現嚴重安全漏洞 籲立即升級 6.23 版以防黑客入侵
平時習慣使用 WinRAR 解壓縮軟件的用家需要注意和提高警覺,根據安全網站 Zero Day Initiat […]
The post WinRAR 現嚴重安全漏洞 籲立即升級 6.23 版以防黑客入侵 appeared first on 香港 unwire.hk 玩生活.樂科技.
#城中熱話 #CVE-2023-40477 #WinRAR 軟件 #ZDI
unwire.hk/2023/08/21/winrar-cv

2023-08-18

A new release of WinRAR has published.

win-rar.com/singlenewsview.htm

This new release closed a new vulnerability, which can give attackers ability to run programs on your machine when opening a rar file!

Advisory Details: zerodayinitiative.com/advisori

#vulnerability #exploitation #advisory #zdi #CVE-2023-40477

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst