The high-severity CVE-2024-6387 in OpenSSH is a reintroduction of a 2006 flaw, and it allows unauthenticated RCE as root.
...moreTotal Articles Found: 36
Top sources:
Top Keywords:
Top Authors
Top Articles:
Published: 2024-07-01 19:38:55
Popularity: 25
Author: Tara Seals, Managing Editor, News, Dark Reading
The high-severity CVE-2024-6387 in OpenSSH is a reintroduction of a 2006 flaw, and it allows unauthenticated RCE as root.
...morePublished: 2024-03-08 17:22:50
Popularity: 45
Author: Tara Seals, Managing Editor, News, Dark Reading
The Midnight Blizzard APT is mounting a sustained, focused cyber campaign against the computing kahuna, using secrets it stole from emails back in January.
...morePublished: 2024-02-02 13:00:00
Popularity: 16
Author: Tara Seals, Managing Editor, News, Dark Reading
The cyberattackers, believed to be state sponsored, didn't get far into Cloudflare's global network, but not for lack of trying.
...morePublished: 2023-12-13 23:26:00
Popularity: 5
Author: Tara Seals, Managing Editor, News, Dark Reading
Russia's APT29 is going after a critical RCE flaw in the JetBrains TeamCity software developer platform, prompting governments worldwide to issue an urgent warning to patch.
...morePublished: 2023-11-06 22:57:00
Popularity: 32
Author: Tara Seals, Managing Editor, News, Dark Reading
Admins need to patch immediately, as the prolific cybercrime group pivots from cryptomining to going after cloud secrets and credentials.
...morePublished: 2023-10-12 20:23:45
Popularity: 17
Author: Tara Seals, Managing Editor, News, Dark Reading
Popular malware like QakBot and DarkGate rely on VBScript, which dates back to 1996 — but their days are numbered now that Microsoft is finally deprecating the Windows programming language.
...morePublished: 2023-09-20 20:09:00
Popularity: 52
Author: Tara Seals, Managing Editor, News, Dark Reading
A supposed exploit for a notable RCE vulnerability in the popular Windows file-archiving utility delivers a big sting for unwitting researchers and cybercriminals.
...morePublished: 2022-12-23 18:18:27
Popularity: 29
Author: Tara Seals, Managing Editor, News, Dark Reading
A complete bypass of the Kyverno security mechanism for container image imports allows cyberattackers to completely take over a Kubernetes pod to steal data and inject malware.
...morePublished: 2022-07-27 18:49:47
Popularity: 950
Author: Tara Seals, Managing Editor, News, Dark Reading
Microsoft flagged the company's Subzero tool set as on offer to unscrupulous governments and shady business interests.
...morePublished: 2022-06-20 21:25:39
Popularity: 25
Author: Tara Seals, Managing Editor, News, Dark Reading
After bragging in underground forums, the woman who stole 100 million credit applications from Capital One has been found guilty.
...morePublished: 2022-05-25 19:21:04
Popularity: 36
Author: Tara Seals, Managing Editor, News, Dark Reading
Google has disclosed a nasty set of six bugs affecting Zoom chat that can be chained together for MitM and RCE attacks, no user interaction required.
...morePublished: 2021-09-29 20:48:33
Popularity: 177
Author: Tara Seals
Keywords:
Apple's personal item-tracker devices can be used to deliver malware, slurp credentials, steal tokens and more thanks to XSS.
...morePublished: 2021-09-09 16:39:13
Popularity: 147
Author: Tara Seals
Keywords:
A chain of exploits could allow a malicious Azure user to infiltrate other customers' cloud instances within Microsoft's container-as-a-service offering.
...morePublished: 2021-08-12 20:10:33
Popularity: None
Author: Tara Seals
The out-of-band warning pairs with a working proof-of-concept exploit for the issue, circulating since mid-July.
...morePublished: 2021-06-08 19:02:25
Popularity: 68
Author: Tara Seals
Keywords:
Google's June security bulletin addresses 90+ bugs in Android and Pixel devices.
...morePublished: 2021-03-18 11:50:44
Popularity: 113
Author: Tara Seals
Keywords:
The popular learning-management system for teacher-student communication is rife with SQL-injection vulnerabilities.
...morePublished: 2021-02-16 16:50:35
Popularity: 302
Author: Tara Seals
Keywords:
Hundreds of thousands of individuals are potentially affected by this vulnerability.
...morePublished: 2021-02-05 22:20:20
Popularity: 133
Author: Tara Seals
Keywords:
An CRSF-to-stored-XSS security bug plagues 50,000 'Contact Form 7' Style users.
...moreThe by-now infamous company has issued patches for three security vulnerabilities in total.
...morePublished: 2021-01-27 20:32:55
Popularity: 440
Author: Tara Seals
Keywords:
A new version of NAT slipstreaming allows cybercriminals an easy path to devices that aren't connected to the internet.
...morePublished: 2020-11-18 21:53:55
Popularity: 172
Author: Tara Seals
Keywords:
WordPress websites using buggy Epsilon Framework themes are being hunted by hackers.
...morePublished: 2020-07-30 17:00:13
Popularity: 265
Author: Tara Seals
Keywords:
The malware is a new payload that uses Dogecoin wallets for its C2, and spreads via the Ngrok botnet.
...morePublished: 2020-07-07 14:44:30
Popularity: 550
Author: Tara Seals
Keywords:
Admins should patch their Citrix ADC and Gateway installs immediately.
...morePublished: 2020-07-02 16:14:46
Popularity: 117
Author: Tara Seals
Keywords:
Several vulnerabilities can be chained together for a full exploit.
...morePublished: 2020-05-01 00:09:53
Popularity: None
Author: Tara Seals
Researchers say the bugs are easy to exploit and will likely be weaponized within a day.
...morePublished: 2020-02-27 04:07:18
Popularity: 990
Author: Tara Seals
Keywords:
The Kr00k bug arises from an all-zero encryption key in Wi-Fi chips that reveals communications from devices from Amazon, Apple, Google, Samsung and others.
...morePublished: 2020-01-29 19:56:14
Popularity: 135
Author: Tara Seals
Keywords:
After a year of big changes, white hats reaped more from Google's programs than ever before.
...morePublished: 2019-10-08 18:53:19
Popularity: None
Author: Tara Seals
CVE-2019-16920 allows remote unauthenticated attackers to execute code on a target device.
...morePublished: 2019-09-10 02:03:15
Popularity: None
Author: Tara Seals
Attackers can drop malware, add the device to a botnet or send their own audio streams to compromised devices.
...morePublished: 2019-07-17 17:29:58
Popularity: 531
Author: Tara Seals
Keywords:
Identifying tokens and random addresses, meant to create anonymity, do not change in sync on some devices -- opening an attack vector.
...morePublished: 2019-05-14 15:21:17
Popularity: 362
Author: Tara Seals
Keywords:
The bug is remotely exploitable without authentication or user interaction.
...morePublished: 2019-04-25 21:13:31
Popularity: 304
Author: Tara Seals
Keywords:
A pair of bugs would allow attackers to compromise the WiFi password of a TV and the multimedia stored inside it.
...morePublished: 2019-03-12 15:09:12
Popularity: 92
Author: Tara Seals
Keywords:
Microsoft won't be patching the bug, but a proof of concept shows the potential for successful malware implantation.
...morePublished: 2019-03-07 23:20:57
Popularity: None
Author: Tara Seals
Cybercriminals are recruiting them to help steal data, make illegal trades or otherwise profit.
...morePublished: 2019-03-07 22:53:44
Popularity: None
Author: Tara Seals
An attacker could swap a benign URL with a malicious one, or edit any text in the body of an email.
...morePublished: 2019-03-07 22:53:29
Popularity: None
Author: Tara Seals
Error can encrypt files with no network communication
...more