Summary

Total Articles Found: 17

Top sources:

Top Keywords:

Top Authors

Top Articles:

  • Cisco Finds Serious Flaws in Sierra Wireless AirLink Devices
  • Researchers Find Exploitable Bugs in Mercedes-Benz Cars
  • North Korean .Gov Hackers Back With Fake Pen-Test Company
  • Pwn2Own 2021: Hackers Offered $200,000 for Zoom, Microsoft Teams Exploits
  • Apple Issues Patches for NAT Slipstreaming 2.0 Attack
  • Adobe: Critical Flaws in Reader, Acrobat, Illustrator
  • Google Warns of Exploited Zero-Days in Chrome Browser
  • Hardcoded Credentials Expose Zyxel Firewalls and WLAN Controllers to Remote Attacks
  • Project Zero Flags High-Risk Zoom Security Flaw
  • Adobe Patches Gaping Security Holes in Acrobat, Reader, Photoshop

Black Hat USA 2022 - Announcements Summary

Hundreds of companies and organizations showcased their products and services this week at the 2022 edition of the Black Hat conference in Las Vegas. read more

...more

Report: L3 Emerges as Suitor for Embattled NSO Group

🤖: "Spy game 😏"

L3 Technologies, a U.S. government contractor that sells aerospace and defense technology, has emerged as a suitor for Israeli exploit merchant NSO Group. read more

...more

Firmware Flaws Allow Disabling Secure Boot on Lenovo Laptops

🤖: "Boot fail"

Computer maker Lenovo has started pushing security patches to address three vulnerabilities impacting the UEFI firmware of more than 110 laptop models. read more

...more

Adobe Patches Gaping Security Holes in Acrobat, Reader, Photoshop

🤖: "security alert"

Adobe's security update engine revved into overdrive this month with the release of patches for at least 78 documented software vulnerabilities, some serious enough to expose corporate customers to remote code execution attacks. read more

...more

Software Supply Chain Weakness: Snyk Warns of 'Deliberate Sabotage' of NPM Ecosystem

Software supply chain security fears escalated again this week with the discovery of what’s being described as "deliberate sabotage" of code in the open-source npm package manager ecosystem. read more

...more

Bypassing Little Snitch Firewall with Empty TCP Packets

Published: 2022-01-26 15:40:25

Popularity: 1

Author: Ryan Gerstenkorn

Keywords:

  • Network Security
  • The post Bypassing Little Snitch Firewall with Empty TCP Packets appeared first on Rhino Security Labs.

    ...more

    Project Zero Flags High-Risk Zoom Security Flaw

    Video conferencing software giant Zoom has shipped patches for a pair of security defects that expose Windows, macOS, Linux, iOS and Android users to malicious hacker attacks. read more

    ...more

    Akamai to Acquire Guardicore in $600M Zero Trust Tech Deal

    Edge security and content delivery giant Akamai Technologies on Wednesday announced plans to spend $600 million to acquire Guardicore, an Israeli micro-segmentation technology startup. Akamai said the deal would add new capabilities to help customers thwart ransomware attacks by blocking the spread of malware within an already-compromised enterprise. read more

    ...more

    Apple Confirms New Zero-Day Attacks on Older iPhones

    Apple on Thursday confirmed a new zero-day exploit hitting older iPhones and warned that the security vulnerability also affects the macOS Catalina platform. read more

    ...more

    Google Warns of Exploited Zero-Days in Chrome Browser

    🤖: "Zero Day Alert"

    Google has joined the list of major software providers scrambling to respond to zero-day exploits in the wild. read more

    ...more

    Adobe: Critical Flaws in Reader, Acrobat, Illustrator

    🤖: "Crashing software"

    Adobe has issued multiple security advisories with patches for critical vulnerabilities in a wide range of software products, including the ever-present Adobe Acrobat and Reader application. read more

    ...more

    Researchers Find Exploitable Bugs in Mercedes-Benz Cars

    🤖: "car hack"

    Following an eight-month audit of the code in the latest infotainment system in Mercedes-Benz cars, security researchers with Tencent Security Keen Lab identified five vulnerabilities, four of which could be exploited for remote code execution. read more

    ...more

    North Korean .Gov Hackers Back With Fake Pen-Test Company

    A North Korean government-backed APT group has been caught using a fake pen-testing company and a range of sock puppet social media accounts in an escalation of a hacking campaign targeting security research professionals. read more

    ...more

    Apple Issues Patches for NAT Slipstreaming 2.0 Attack

    Published: 2021-02-02 11:26:42

    Popularity: 42

    Author: Ionut Arghire

    Keywords:

  • Network Security
  • NEWS & INDUSTRY
  • Vulnerabilities
  • Apple this week released security updates to address multiple vulnerabilities in macOS and Safari, including a flaw that can be exploited for the recently disclosed NAT Slipstreaming 2.0 attack. read more

    ...more

    Pwn2Own 2021: Hackers Offered $200,000 for Zoom, Microsoft Teams Exploits

    Published: 2021-01-27 09:49:45

    Popularity: 54

    Author: Eduard Kovacs

    Keywords:

  • Endpoint Security
  • Network Security
  • NEWS & INDUSTRY
  • Application Security
  • Cloud Security
  • Vulnerabilities
  • IoT Security
  • Trend Micro’s Zero Day Initiative (ZDI) on Tuesday announced the targets, prizes and rules for the Pwn2Own Vancouver 2021 hacking competition, a hybrid event scheduled to take place on April 6-8. read more

    ...more

    Hardcoded Credentials Expose Zyxel Firewalls and WLAN Controllers to Remote Attacks

    Published: 2021-01-04 15:12:42

    Popularity: 24

    Author: Ionut Arghire

    Keywords:

  • Network Security
  • NEWS & INDUSTRY
  • Vulnerabilities
  • 🤖: "passwords out"

    Several Zyxel firewall and WLAN controller products contain hardcoded credentials for an undocumented user account that has admin privileges. Identified by EYE security researcher Niels Teusink, the vulnerability exists because the password for the “zyfwp” user account was stored in plaintext and was visible in one of the binaries on the system. read more

    ...more

    Cisco Finds Serious Flaws in Sierra Wireless AirLink Devices

    Published: 2019-04-26 13:55:06

    Popularity: 153

    Author: Eduard Kovacs

    Keywords:

  • Network Security
  • NEWS & INDUSTRY
  • SCADA / ICS
  • Vulnerabilities
  • Cisco’s Talos research and intelligence group on Thursday disclosed the details of nearly a dozen vulnerabilities uncovered in Sierra Wireless AirLink devices, including serious flaws that can be exploited to change system settings, execute arbitrary code, and modify passwords. read more

    ...more

    end