A researcher received a $5,500 bug bounty for discovering a vulnerability (CVE-2024-2879) in LayerSlider, a plug-in with more than a million active installations.
...moreTotal Articles Found: 27
Top sources:
Top Keywords:
Top Authors
Top Articles:
Published: 2024-04-05 11:34:21
Popularity: None
Author: Elizabeth Montalbano, Contributing Writer
A researcher received a $5,500 bug bounty for discovering a vulnerability (CVE-2024-2879) in LayerSlider, a plug-in with more than a million active installations.
...morePublished: 2024-03-21 18:17:06
Popularity: 8
Author: Elizabeth Montalbano, Contributing Writer
Attackers can create a self-perpetuating, infinite scenario in such a way that volumes of traffic overwhelm network resources indefinitely.
...morePublished: 2024-01-25 16:40:00
Popularity: 16
Author: Elizabeth Montalbano, Contributing Writer
Misunderstanding the permissions of an authentication group in Google Kubernetes Engine (GKE) opens millions of containers to anyone with a Google account.
...morePublished: 2023-10-24 13:00:00
Popularity: 285
Author: Elizabeth Montalbano, Contributor, Dark Reading
Hundreds of millions of users of Grammarly, Vidio, and the Indonesian e-commerce giant Bukalapak are at risk for financial fraud and credential theft due to OAuth misfires — and other online services likely have the same problems.
...morePublished: 2023-03-30 18:58:13
Popularity: 50
Author: Elizabeth Montalbano, Contributor, Dark Reading
The vulnerability would have allowed an unauthenticated attacker to execute code on a container hosted on one of the platform's nodes.
...morePublished: 2023-03-02 16:16:00
Popularity: 15
Author: Elizabeth Montalbano, Contributor, Dark Reading
Researchers exploited issues in the authentication protocol to force an open redirection from the popular hotel reservations site when users used Facebook to log in to accounts.
...morePublished: 2022-12-08 14:12:04
Popularity: 119
Author: Elizabeth Montalbano, Contributor, Dark Reading
Common mistakes in network configuration can jeopardize the security of highly protected assets and allow attackers to steal critical data from the enterprise.
...morePublished: 2022-10-11 14:23:07
Popularity: 56
Author: Elizabeth Montalbano, Contributor, Dark Reading
Attackers could exploit the "Sandbreak" security bug, which has earned a 10 out of 10 on the CVSS scale, to execute a sandbox escape, achieve RCE, and run shell commands on a hosting machine.
...morePublished: 2022-10-12 16:20:35
Popularity: 14
Author: Elizabeth Montalbano, Contributor, Dark Reading
The platform lets network connectivity data escape outside of the secure tunnel when connected to a public network, posing a "privacy concern" for users with "certain threat models," researchers said.
...morePublished: 2022-09-20 17:37:16
Popularity: 131
Author: Elizabeth Montalbano, Contributor, Dark Reading
It's called "spell-jacking": Both browsers have spell-check features that send data to Microsoft and Google when users fill out forms for websites or Web services.
...morePublished: 2022-08-30 14:16:23
Popularity: 35
Author: Elizabeth Montalbano, Contributor, Dark Reading
The first-of-its-kind campaign threatens to remove code packages if developers don’t submit their code to a "validation" process.
...morePublished: 2022-05-19 13:03:37
Popularity: 238
Author: Elizabeth Montalbano
Keywords:
Privilege escalation flaw discovered in the Jupiter and JupiterX Core Plugin affects more than 90,000 sites.
...moreMicrosoft Word also leveraged in the email campaign, which uses a 22-year-old Office RCE bug.
...morePublished: 2022-05-04 10:27:47
Popularity: 97
Author: Elizabeth Montalbano
Keywords:
A flaw in all versions of the popular C standard libraries uClibe and uClibe-ng can allow for DNS poisoning attacks against target devices.
...morePublished: 2022-04-27 12:11:25
Popularity: 70
Author: Elizabeth Montalbano
Keywords:
Four months after the critical flaw was discovered, attackers have a massive attack surface from which they can exploit the flaw and take over systems, researchers found.
...morePublished: 2021-01-27 12:21:28
Popularity: 1153
Author: Elizabeth Montalbano
Keywords:
An anonymous researcher identified bugs in the software’s kernel and WebKit browser engine that are likely part of an exploit chain.
...morePublished: 2020-01-21 11:57:20
Popularity: 568
Author: Elizabeth Montalbano
Keywords:
Bad actor obtained passwords for servers, home routers, and smart devices by scanning internet for devices open to the Telnet port.
...morePublished: 2024-05-15 15:42:28
Popularity: 10
Author: Elizabeth Montalbano, Contributing Writer
A vulnerability in the HNAP login request protocol that affects a family of devices gives unauthenticated users root access for command execution.
...morePublished: 2024-04-23 13:21:39
Popularity: 14
Author: Elizabeth Montalbano, Contributing Writer
The infamous Russian threat actor has created a custom tool called GooseEgg to exploit CVE-2022-38028 in cyber-espionage attacks against targets in Ukraine, Western Europe, and North America.
...morePublished: 2024-04-25 15:59:45
Popularity: 6
Author: Elizabeth Montalbano, Contributing Writer
Attacks by a previously unknown threat actor leveraged two bugs in firewall devices to install custom backdoors on several government networks globally.
...morePublished: 2024-05-30 15:43:41
Popularity: 6
Author: Elizabeth Montalbano, Contributing Writer
This time it's the identity management service provider's cross-origin authentication feature that's being targeted by adversaries.
...morePublished: 2024-07-18 17:53:43
Popularity: 21
Author: Elizabeth Montalbano, Contributing Writer
Three newly discovered SMTP smuggling attack techniques can exploit misconfigurations and design decisions made by at least 50 email-hosting providers.
...morePublished: 2024-07-22 18:18:55
Popularity: 145
Author: Elizabeth Montalbano, Contributing Writer
Apps like Tinder, Bumble, Grindr, Badoo, OKCupid, MeetMe, and Hinge all have API vulnerabilities that expose sensitive user data, and six allow a threat actor to pinpoint exactly where someone is.
...morePublished: 2024-07-23 16:21:16
Popularity: 7
Author: Elizabeth Montalbano, Contributing Writer
An exploit sold on an underground forum requires user action to download an unspecified malicious payload.
...morePublished: 2024-07-25 15:32:05
Popularity: 22
Author: Elizabeth Montalbano, Contributing Writer
A software engineer hired for an internal IT AI team immediately became an insider threat by loading malware onto his workstation.
...morePublished: 2024-08-14 14:16:57
Popularity: 22
Author: Elizabeth Montalbano, Contributing Writer
Cloud services and thus millions of end users who access them could have been affected by the poisoning of artifacts in the development workflow of open source projects.
...morePublished: 2024-10-02 15:18:01
Popularity: 6
Author: Elizabeth Montalbano, Contributing Writer
The prolific Chinese APT Mustang Panda is the likely culprit behind a sophisticated cyber-espionage attack that sets up persistent remote access to victim machines.
...more