Summary

Total Articles Found: 14

Top sources:

Top Keywords:

Top Authors

Top Articles:

  • MacOS Zero-Day Allows Trusted Apps to Run Malicious Code
  • Critical Bug in WordPress Plugins Open Sites to Hacker Takeovers
  • Adobe Snuffs Critical Bugs in Acrobat, Experience Manager
  • Hackers Leverage Adobe Zero-Day Bug Impacting Acrobat Reader
  • Cisco Patches Critical IOx Vulnerability
  • Multiple Vulnerabilities Found in NVIDIA, Qualcomm, Huawei Bootloaders
  • BoundHook Attack Exploits Intel Skylake MPX Feature
  • US-CERT Warns of Crypto Bugs in IEEE Standard
  • Flaw Found In Dirty COW Patch
  • Mozilla Patches Critical Bug in Thunderbird

Adobe Snuffs Critical Bugs in Acrobat, Experience Manager

Published: 2021-09-14 21:02:49

Popularity: 44

Author: Tom Spring

Keywords:

  • Vulnerabilities
  • Adobe releases security updates for 59 bugs affecting its core products, including Adobe Acrobat Reader, XMP Toolkit SDK and Photoshop.

    ...more

    Hackers Leverage Adobe Zero-Day Bug Impacting Acrobat Reader

    Published: 2021-05-12 11:19:06

    Popularity: None

    Author: Tom Spring

    🤖: "Acrobat Crash"

    A patch for Adobe Acrobat, the world’s leading PDF reader, fixes a vulnerability under active attack affecting both Windows and macOS systems that could lead to arbitrary code execution.

    ...more

    Critical Bug in WordPress Plugins Open Sites to Hacker Takeovers

    Published: 2019-12-13 18:33:39

    Popularity: 743

    Author: Tom Spring

    Keywords:

  • Hacks
  • Vulnerabilities
  • authentication bypass
  • Beaver Builder
  • Elementor
  • Ultimate addon
  • wordpress
  • One flaw found in WordPress plugins Ultimate Addons for Beaver Builder and Ultimate Addons for Elementor is actively being exploited.

    ...more

    MacOS Zero-Day Allows Trusted Apps to Run Malicious Code

    Published: 2019-06-03 12:28:42

    Popularity: 1233

    Author: Tom Spring

    Keywords:

  • Hacks
  • Privacy
  • Vulnerabilities
  • apple
  • macOS
  • Mojave
  • Patrick Wardle
  • security bypass
  • synthetic mouse clicks
  • vulnerability
  • zero-day
  • Apple 0-Day allows hackers to mimic mouse-clicks to allow malicious behavior on macOS Mojave, despite mitigations.

    ...more

    Cisco Patches Critical IOx Vulnerability

    Published: 2019-03-07 23:09:50

    Popularity: None

    Author: Tom Spring

    Cisco Systems patched a critical vulnerability that could give an attacker root privileges to software running on two of its IoT router models.

    ...more

    Multiple Vulnerabilities Found in NVIDIA, Qualcomm, Huawei Bootloaders

    Published: 2019-03-07 22:52:35

    Popularity: None

    Author: Tom Spring

    Researchers find six previously unknown memory corruption and unlock-bypass vulnerabilities in major chipset vendors’ firmware code.

    ...more

    BoundHook Attack Exploits Intel Skylake MPX Feature

    Published: 2019-03-07 22:46:37

    Popularity: None

    Author: Tom Spring

    A new attack method takes advantage a feature in Intel’s Skylake microprocessor allowing for post-intrusion application hooking and stealth manipulation of applications.

    ...more

    US-CERT Warns of Crypto Bugs in IEEE Standard

    Published: 2019-03-07 22:43:02

    Popularity: None

    Author: Tom Spring

    Weak cryptography in the IEEE P1735 electronics standard allow attackers to recover valuable intellectual property in plaintext from SoCs and integrated circuits.

    ...more

    Flaw Found In Dirty COW Patch

    Published: 2019-03-07 22:37:02

    Popularity: None

    Author: Tom Spring

    Researchers have found a flaw in the original fix for the Dirty COW vulnerability patched in October 2016.

    ...more

    Mozilla Patches Critical Bug in Thunderbird

    Published: 2019-03-07 22:36:47

    Popularity: None

    Author: Tom Spring

    Mozilla has patched one critical vulnerability in its Thunderbird email client along with two bugs rated high.

    ...more

    Code Used in Zero Day Huawei Router Attack Made Public

    Published: 2019-03-07 22:36:13

    Popularity: None

    Author: Tom Spring

    Researchers warn of copycat type attacks as exploit code used in Mirai variant goes public.

    ...more

    PoC Attack Escalates MikroTik Router Bug to ‘As Bad As It Gets’

    Published: 2019-03-07 22:08:21

    Popularity: None

    Author: Tom Spring

    Researchers say a medium severity bug should now be rated critical because of a new hack technique that allows for remote code execution on MikroTik edge and consumer routers.

    ...more

    Old Printer Vulnerabilities Die Hard

    Published: 2019-03-07 22:04:29

    Popularity: None

    Author: Tom Spring

    New research on an old problem reveals despite efforts, the InfoSec professionals still have a way to go when it comes to securing printers.

    ...more

    Lenovo Watch X Riddled with Security Vulnerabilities

    Published: 2019-03-07 21:57:28

    Popularity: None

    Author: Tom Spring

    Researchers have identified multiple security issues with this Lenovo smartwatch.

    ...more

    end