Summary

Total Articles Found: 5

Top sources:

Top Keywords:

Top Authors

Top Articles:

  • All versions of Apache Tomcat are affected by the Ghostcat flaw
  • New strain of Cerberus Android banking trojan can steal Google Authenticator codes
  • Two issues in Zoom could have allowed code execution
  • Flaws in mobile Internet protocol GTP allow hackers to target 5G users
  • A high-severity flaw affects VMware Workstation, Fusion and vSphere products.

Flaws in mobile Internet protocol GTP allow hackers to target 5G users

Security vulnerabilities in modern communication protocol GTP used by mobile network operators can be exploited by attackers to target 4G/5G users. Researchers at cybersecurity firm Positive Technologies Security have discovered several vulnerabilities in communication protocol GPRS Tunnelling Protocol (GTP), that is used by mobile network operators (MNOs). Threat actors could exploit these flaws to conduct several […] The post Flaws in mobile Internet protocol GTP allow hackers to target 5G users appeared first on Security Affairs.

...more

A high-severity flaw affects VMware Workstation, Fusion and vSphere products.

VMware has addressed a high-severity information disclosure vulnerability affecting its Workstation, Fusion and vSphere virtualization products. VMware has addressed a high-severity information disclosure vulnerability, tracked as CVE-2020-3960, that affects its Workstation, Fusion and vSphere virtualization products. The CVE-2020-3960 flaw was discovered by Cfir Cohen, a researcher from Google’s cloud security team. ESXi, Workstation and Fusion […] The post A high-severity flaw affects VMware Workstation, Fusion and vSphere products. appeared first on Security Affairs.

...more

Two issues in Zoom could have allowed code execution

Published: 2020-06-03 23:10:57

Popularity: 68

Author: Pierluigi Paganini

Keywords:

  • Breaking News
  • Hacking
  • hacking news
  • information security news
  • it security
  • it security affairs
  • it security news
  • Security News
  • Zoom
  • Researchers from Cisco Talos disclosed two critical flaws in the Zoom software that could have allowed attackers to hack into the systems via chat. Zoom is one of the most popular video-conferencing software, every day it is used by millions of users, especially during the COVID outbreak. Cybersecurity researchers from Cisco Talos have disclosed two critical vulnerabilities […] The post Two issues in Zoom could have allowed code execution appeared first on Security Affairs.

    ...more

    New strain of Cerberus Android banking trojan can steal Google Authenticator codes

    Published: 2020-02-27 13:21:26

    Popularity: 74

    Author: Pierluigi Paganini

    Keywords:

  • Breaking News
  • Cyber Crime
  • Malware
  • Mobile
  • Android
  • Cerberus
  • it security
  • it security news
  • malware
  • Security Affairs
  • security affairs news
  • Security News
  • Trojan
  • LLM Says: "Trojan alert"

    Experts found a new version of the Cerberus Android banking trojan that can steal one-time codes generated by the Google Authenticator app and bypass 2FA. Security researchers from ThreatFabric warn of a new Android malware strain can now steal one-time passcodes (OTP) generated through Google Authenticator that is used as part of 2FA to protect online […] The post New strain of Cerberus Android banking trojan can steal Google Authenticator codes appeared first on Security Affairs.

    ...more

    All versions of Apache Tomcat are affected by the Ghostcat flaw

    Published: 2020-02-28 22:45:13

    Popularity: 109

    Author: Pierluigi Paganini

    Keywords:

  • Breaking News
  • Hacking
  • Apache Tomcat
  • Ghostcat
  • information security news
  • it security
  • it security news
  • Pierluigi Paganini
  • Security Affairs
  • Security News
  • Ghostcat flaw affects all versions of Apache Tomcat and could be exploited by hackers to read configuration files or install backdoors on vulnerable servers. All versions of Apache Tomcat are affected by a vulnerability dubbed Ghostcat that could be exploited by attackers to read configuration files or install backdoors on vulnerable servers. The vulnerability, tracked as […] The post All versions of Apache Tomcat are affected by the Ghostcat flaw appeared first on Security Affairs.

    ...more

    end