Summary

Total Articles Found: 94

Top sources:

Top Keywords:

Top Authors

Top Articles:

  • Amazon Admits Alexa Voice Recordings Saved Indefinitely
  • MacOS Zero-Day Allows Trusted Apps to Run Malicious Code
  • Kerberos Authentication Spoofing: Don’t Bypass the Spec
  • Apple Patches Three Actively Exploited Zero-Days, Part of iOS Emergency Update
  • Billions of Devices Open to Wi-Fi Eavesdropping Attacks
  • BrakTooth Bluetooth Bugs Bite: Exploit Code, PoC Released
  • Critical Bug in WordPress Plugins Open Sites to Hacker Takeovers
  • Attackers Exploit Critical Adobe Flaw to Target Windows Users
  • Hacker Leaks More Than 500K Telnet Credentials for IoT Devices
  • Citrix Bugs Allow Unauthenticated Code Injection, Data Theft

Popular NFT Marketplace Phished for $540M

Published: 2022-07-11 20:06:10

Popularity: 43

Author: Nate Nelson

Keywords:

  • Cryptography
  • Hacks
  • In March, a North Korean APT siphoned blockchain gaming platform Axie Infinity of $540M.

    ...more

    China-linked APT Flew Under Radar for Decade

    Published: 2022-06-17 13:34:04

    Popularity: 57

    Author: Nate Nelson

    Keywords:

  • Government
  • Malware
  • Vulnerabilities
  • Evidence suggests that a just-discovered APT has been active since 2013.

    ...more

    Critical Vulnerability in Premium WordPress Themes Allows for Site Takeover

    Published: 2022-05-19 13:03:37

    Popularity: 238

    Author: Elizabeth Montalbano

    Keywords:

  • Vulnerabilities
  • Web Security
  • Privilege escalation flaw discovered in the Jupiter and JupiterX Core Plugin affects more than 90,000 sites.

    ...more

    Snake Keylogger Spreads Through Malicious PDFs

    Published: 2022-05-23 12:07:56

    Popularity: 307

    Author: Elizabeth Montalbano

    Keywords:

  • Malware
  • Microsoft Word also leveraged in the email campaign, which uses a 22-year-old Office RCE bug.

    ...more

    Unpatched DNS Bug Puts Millions of Routers, IoT Devices at Risk

    Published: 2022-05-04 10:27:47

    Popularity: 97

    Author: Elizabeth Montalbano

    Keywords:

  • IoT
  • Vulnerabilities
  • A flaw in all versions of the popular C standard libraries uClibe and uClibe-ng can allow for DNS poisoning attacks against target devices.

    ...more

    Millions of Java Apps Remain Vulnerable to Log4Shell

    Published: 2022-04-27 12:11:25

    Popularity: 70

    Author: Elizabeth Montalbano

    Keywords:

  • Vulnerabilities
  • Web Security
  • Four months after the critical flaw was discovered, attackers have a massive attack surface from which they can exploit the flaw and take over systems, researchers found.

    ...more

    Lapsus$ Hackers Target T-Mobile

    Published: 2022-04-25 13:32:43

    Popularity: 170

    Author: Threatpost

    Keywords:

  • Breach
  • No government and customer data was accessed.

    ...more

    Log4JShell Used to Swarm VMware Servers with Miners, Backdoors

    Published: 2022-03-29 20:33:08

    Popularity: 52

    Author: Lisa Vaas

    Keywords:

  • Malware
  • Vulnerabilities
  • Web Security
  • Researchers have found three backdoors and four miners in attacks exploiting the Log4Shell vulnerability, some of which are still ongoing.

    ...more

    20K WordPress Sites Exposed by Insecure Plugin REST-API

    Published: 2022-01-21 18:19:37

    Popularity: 34

    Author: Becky Bracken

    Keywords:

  • Vulnerabilities
  • Web Security
  • The WordPress WP HTML Mail plugin for personalized emails is vulnerable to code injection and phishing due to XSS.

    ...more

    BrakTooth Bluetooth Bugs Bite: Exploit Code, PoC Released

    Published: 2021-11-05 17:00:57

    Popularity: 932

    Author: Lisa Vaas

    Keywords:

  • Mobile Security
  • Vulnerabilities
  • CISA is urging vendors to patch, given the release of public exploit code & a proof of concept tool for bugs that open billions of devices – phones, PCs, toys, etc. – to DoS & code execution.

    ...more

    Zoho Password Manager Flaw Torched by Godzilla Webshell

    Published: 2021-11-08 16:38:05

    Popularity: 36

    Author: Lisa Vaas

    Keywords:

  • Malware
  • Vulnerabilities
  • Web Security
  • Researchers have spotted a second, worldwide campaign exploiting the Zoho zero-day: one that’s breached defense, energy and healthcare organizations.

    ...more

    Android Patches Actively Exploited Zero-Day Kernel Bug

    Published: 2021-11-02 17:20:42

    Popularity: 49

    Author: Lisa Vaas

    Keywords:

  • Mobile Security
  • Vulnerabilities
  • Google’s Android November 2021 security updates plug 18 flaws in the framework and system components and 18 more in the kernel and vendor components.

    ...more

    Twitter Suspends Accounts Used to Snare Security Researchers

    Published: 2021-10-18 16:23:21

    Popularity: 88

    Author: Lisa Vaas

    Keywords:

  • Hacks
  • Malware
  • Vulnerabilities
  • Web Security
  • The accounts were used to catfish security researchers into downloading malware in a long-running cyber-espionage campaign attributed to North Korea.

    ...more

    MFA Glitch Leads to 6K+ Coinbase Customers Getting Robbed

    Published: 2021-10-01 20:08:23

    Popularity: 191

    Author: Lisa Vaas

    Keywords:

  • Breach
  • Hacks
  • Mobile Security
  • Vulnerabilities
  • Coinbase suspects phishing led to attackers getting personal details needed to access wallets but also blamed a flaw in its SMS-based 2FA.

    ...more

    Apple AirTag Zero-Day Weaponizes Trackers

    Published: 2021-09-29 20:48:33

    Popularity: 177

    Author: Tara Seals

    Keywords:

  • IoT
  • Malware
  • Vulnerabilities
  • Web Security
  • Apple's personal item-tracker devices can be used to deliver malware, slurp credentials, steal tokens and more thanks to XSS.

    ...more

    Adobe Snuffs Critical Bugs in Acrobat, Experience Manager

    Published: 2021-09-14 21:02:49

    Popularity: 44

    Author: Tom Spring

    Keywords:

  • Vulnerabilities
  • Adobe releases security updates for 59 bugs affecting its core products, including Adobe Acrobat Reader, XMP Toolkit SDK and Photoshop.

    ...more

    SideWalk Backdoor Linked to China-Linked Spy Group ‘Grayfly’

    Published: 2021-09-09 14:30:56

    Popularity: 115

    Author: Lisa Vaas

    Keywords:

  • Hacks
  • Malware
  • Vulnerabilities
  • Web Security
  • Grayfly campaigns have launched the novel malware against businesses in Taiwan, Vietnam, the US and Mexico and are targeting Exchange and MySQL servers.

    ...more

    ‘Azurescape’ Kubernetes Attack Allows Cross-Container Cloud Compromise

    Published: 2021-09-09 16:39:13

    Popularity: 147

    Author: Tara Seals

    Keywords:

  • Cloud Security
  • Vulnerabilities
  • A chain of exploits could allow a malicious Azure user to infiltrate other customers' cloud instances within Microsoft's container-as-a-service offering.

    ...more

    Thousands of Fortinet VPN Account Credentials Leaked

    Published: 2021-09-09 22:49:27

    Popularity: 39

    Author: Lisa Vaas

    Keywords:

  • Malware
  • Vulnerabilities
  • Web Security
  • They were posted for free by former Babuk gang members who’ve bickered, squabbled and huffed off to start their own darn ransomware businesses, dagnabbit.

    ...more

    Kerberos Authentication Spoofing: Don’t Bypass the Spec

    Published: 2021-08-18 13:19:15

    Popularity: 1210

    Author: Yaron Kassner

    Keywords:

  • Hacks
  • InfoSec Insider
  • Vulnerabilities
  • Web Security
  • Yaron Kassner, CTO at Silverfort, discusses authentication-bypass bugs in Cisco ASA, F5 Big-IP, IBM QRadar and Palo Alto Networks PAN-OS.

    ...more

    Microsoft Warns: There's Another Unpatched PrintNightmare Zero-Day

    Published: 2021-08-12 20:10:33

    Popularity: None

    Author: Tara Seals

    LLM Says: ""Printer fails""

    The out-of-band warning pairs with a working proof-of-concept exploit for the issue, circulating since mid-July.

    ...more

    Pro-Trump ‘Gettr’ Social Platform Hacked On Day One

    Published: 2021-07-07 03:27:13

    Popularity: 114

    Author: Lisa Vaas

    Keywords:

  • Hacks
  • Web Security
  • The newborn platform was inundated by Sonic the Hedgehog-themed porn and had prominent users' profiles defaced. Next, hackers posted its user database online.

    ...more

    Microsoft Signs Malware That Spreads Through Gaming

    Published: 2021-06-28 16:36:45

    Popularity: 221

    Author: Lisa Vaas

    Keywords:

  • Hacks
  • Malware
  • The driver, called "Netfilter," is a rootkit that talks to Chinese C2 IPs and aims to spoof gamers' geo-locations to cheat the system and play from anywhere, Microsoft said.

    ...more

    Critical VMware Carbon Black Bug Allows Authentication Bypass

    Published: 2021-06-24 15:31:31

    Popularity: 74

    Author: Lisa Vaas

    Keywords:

  • Vulnerabilities
  • The 9.4-rated bug in AppC could give attackers admin rights, no authentication required, letting them attack anything from PoS to industrial control systems.

    ...more

    Google Patches Critical Android RCE Bug

    Published: 2021-06-08 19:02:25

    Popularity: 68

    Author: Tara Seals

    Keywords:

  • Mobile Security
  • Vulnerabilities
  • Google's June security bulletin addresses 90+ bugs in Android and Pixel devices.

    ...more

    Apple’s ‘Find My’ Network Exploited via Bluetooth

    Published: 2021-05-14 11:00:02

    Popularity: None

    Author: Anonymous

    LLM Says: "Bluetooth hijack"

    The ‘Send My’ exploit can use Apple's locator service to collect and send information from nearby devices for later upload to iCloud servers.

    ...more

    Hackers Leverage Adobe Zero-Day Bug Impacting Acrobat Reader

    Published: 2021-05-12 11:19:06

    Popularity: None

    Author: Tom Spring

    LLM Says: "Acrobat Crash"

    A patch for Adobe Acrobat, the world’s leading PDF reader, fixes a vulnerability under active attack affecting both Windows and macOS systems that could lead to arbitrary code execution.

    ...more

    Zoom Screen-Sharing Glitch ‘Briefly’ Leaks Sensitive Data

    Published: 2021-03-18 15:52:29

    Popularity: 268

    Author: Lindsey O'Donnell

    Keywords:

  • Vulnerabilities
  • Web Security
  • A glitch in Zoom's screen-sharing feature shows parts of presenters' screens that they did not intend to share - potentially leaking emails or passwords.

    ...more

    Tutor LMS for WordPress Open to Info-Stealing Security Holes

    Published: 2021-03-18 11:50:44

    Popularity: 113

    Author: Tara Seals

    Keywords:

  • Vulnerabilities
  • Web Security
  • The popular learning-management system for teacher-student communication is rife with SQL-injection vulnerabilities.

    ...more

    Adobe Critical Code-Execution Flaws Plague Windows Users

    Published: 2021-03-10 11:55:14

    Popularity: None

    Author: None

    LLM Says: "Crashing windows"

    The critical flaws exist in Adobe Framemaker, Connect and the Creative Cloud desktop application for Windows.

    ...more

    Critical WordPress Plugin Flaw Allows Site Takeover

    Published: 2021-02-08 21:11:57

    Popularity: 124

    Author: Lindsey O'Donnell

    Keywords:

  • Vulnerabilities
  • Web Security
  • A patch in the NextGen Gallery WordPress plugin fixes critical and high-severity cross-site request forgery flaws.

    ...more

    Attackers Exploit Critical Adobe Flaw to Target Windows Users

    Published: 2021-02-09 19:40:47

    Popularity: 643

    Author: Lindsey O'Donnell

    Keywords:

  • Vulnerabilities
  • Web Security
  • A critical vulnerability in Adobe Reader has been exploited in "limited attacks."

    ...more

    Misconfigured Baby Monitors Allow Unauthorized Viewing

    Published: 2021-02-16 16:50:35

    Popularity: 302

    Author: Tara Seals

    Keywords:

  • Cloud Security
  • IoT
  • Mobile Security
  • Vulnerabilities
  • Web Security
  • Hundreds of thousands of individuals are potentially affected by this vulnerability.

    ...more

    Intel Squashes High-Severity Graphics Driver Flaws

    Published: 2021-02-10 15:16:15

    Popularity: 125

    Author: Lindsey O'Donnell

    Keywords:

  • Vulnerabilities
  • Intel is warning on security bugs across its graphics drivers, server boards, compute modules and modems.

    ...more

    Unpatched WordPress Plugin Code-Injection Bug Afflicts 50K Sites

    Published: 2021-02-05 22:20:20

    Popularity: 133

    Author: Tara Seals

    Keywords:

  • Vulnerabilities
  • Web Security
  • An CRSF-to-stored-XSS security bug plagues 50,000 'Contact Form 7' Style users.

    ...more

    SolarWinds Orion Bug Allows Easy Remote-Code Execution and Takeover

    Published: 2021-02-03 11:00:21

    Popularity: 261

    Author: Tara Seals

    Keywords:

  • Vulnerabilities
  • The by-now infamous company has issued patches for three security vulnerabilities in total.

    ...more

    Remote Attackers Can Now Reach Protected Network Devices via NAT Slipstreaming

    Published: 2021-01-27 20:32:55

    Popularity: 440

    Author: Tara Seals

    Keywords:

  • Critical Infrastructure
  • Hacks
  • Vulnerabilities
  • Web Security
  • A new version of NAT slipstreaming allows cybercriminals an easy path to devices that aren't connected to the internet.

    ...more

    ADT Security Camera Flaws Open Homes to Eavesdropping

    Published: 2021-01-27 18:05:51

    Popularity: 227

    Author: Lindsey O'Donnell

    Keywords:

  • IoT
  • Privacy
  • Vulnerabilities
  • Researchers publicly disclosed flaws in ADT's LifeShield DIY HD Video Doorbell, which could have allowed local attackers to access credentials, video feeds and more.

    ...more

    Apple Patches Three Actively Exploited Zero-Days, Part of iOS Emergency Update

    Published: 2021-01-27 12:21:28

    Popularity: 1153

    Author: Elizabeth Montalbano

    Keywords:

  • Vulnerabilities
  • An anonymous researcher identified bugs in the software’s kernel and WebKit browser engine that are likely part of an exploit chain.

    ...more

    Google Warns of Critical Android Remote Code Execution Bug

    Google's Android security update addressed 43 bugs overall affecting Android handsets, including Samsung phones.

    ...more

    Widespread Scans Underway for RCE Bugs in WordPress Websites

    WordPress websites using buggy Epsilon Framework themes are being hunted by hackers.

    ...more

    High-Severity Android RCE Flaw Fixed in August Security Update

    Published: 2020-08-05 16:14:26

    Popularity: 124

    Author: Lindsey O'Donnell

    Keywords:

  • Mobile Security
  • Vulnerabilities
  • Android
  • Android operating system
  • google
  • high severity flaw
  • Qualcomm
  • RCE
  • remote code execution
  • Google addressed high-severity and critical flaws tied to 54 CVEs in this month's Android security bulletin.

    ...more

    Doki Backdoor Infiltrates Docker Servers in the Cloud

    Published: 2020-07-30 17:00:13

    Popularity: 265

    Author: Tara Seals

    Keywords:

  • Cloud Security
  • Malware
  • APIs
  • cloud
  • command and control
  • container security
  • DGA
  • Docker
  • Docker Hub
  • dogecoin wallet
  • doki
  • misconfiguration
  • ngrok botnet
  • The malware is a new payload that uses Dogecoin wallets for its C2, and spreads via the Ngrok botnet.

    ...more

    Zoom Flaw Could Have Allowed Hackers To Crack Meeting Passcodes

    Published: 2020-07-30 21:40:31

    Popularity: 146

    Author: Lindsey O'Donnell

    Keywords:

  • Vulnerabilities
  • Web Security
  • incorrect passcode check
  • passcode
  • security issue
  • zoom
  • zoom flaw
  • Zoom has fixed the issue, which stemmed from a lack of checks against incorrect passcode attempts.

    ...more

    Citrix Bugs Allow Unauthenticated Code Injection, Data Theft

    Admins should patch their Citrix ADC and Gateway installs immediately.

    ...more

    Apache Guacamole Opens Door for Total Control of Remote Footprint

    Several vulnerabilities can be chained together for a full exploit.

    ...more

    Adobe Patches 18 Critical Flaws in Out-Of-Band Update

    Critical vulnerabilities were patched in Adobe After Effects, Illustrator, Premiere Pro, Premiere Rush and Audition.

    ...more

    Critical Intel Flaws Fixed in Active Management Technology

    Published: 2020-06-10 18:37:53

    Popularity: 138

    Author: Lindsey O'Donnell

    Keywords:

  • Vulnerabilities
  • critical flaw
  • Intel
  • Intel AMT
  • Intel Security
  • intel security update
  • Security
  • vulnerability
  • Two critical flaws in Intel AMT, which could enable privilege escalation, were patched along with 20 other bugs in its June security update.

    ...more

    Zoom Restricts End-to-End Encryption to Paid Users

    Published: 2020-06-04 17:02:34

    Popularity: 372

    Author: Lindsey O'Donnell

    Keywords:

  • Privacy
  • Web Security
  • End to end encryption
  • FBI
  • law enforcement
  • work from home
  • zoom
  • zoom privacy
  • zoom security
  • The end-to-end encryption feature will not be offered to free users, Zoom's CEO said, in case Zoom needed to comply with federal and local law enforcement.

    ...more

    Salt Bugs Allow Full RCE as Root on Cloud Servers

    Published: 2020-05-01 00:09:53

    Popularity: None

    Author: Tara Seals

    LLM Says: "Cloud fail"

    Researchers say the bugs are easy to exploit and will likely be weaponized within a day.

    ...more

    Critical GitLab Flaw Earns Bounty Hunter $20K

    Published: 2020-04-30 00:05:53

    Popularity: None

    Author: None

    LLM Says: "Vulnerable code"

    A GitLab path traversal flaw could allow attackers to read arbitrary files and remotely execute code.

    ...more

    Billions of Devices Open to Wi-Fi Eavesdropping Attacks

    The Kr00k bug arises from an all-zero encryption key in Wi-Fi chips that reveals communications from devices from Amazon, Apple, Google, Samsung and others.

    ...more

    Google Sets Record High in Bug-Bounty Payouts

    After a year of big changes, white hats reaped more from Google's programs than ever before.

    ...more

    Hacker Leaks More Than 500K Telnet Credentials for IoT Devices

    Published: 2020-01-21 11:57:20

    Popularity: 568

    Author: Elizabeth Montalbano

    Keywords:

  • Breach
  • IoT
  • Web Security
  • botnet
  • Credentials
  • CyCognito
  • data breach
  • data leak
  • DDoS
  • DDoS attacks
  • hacker
  • IoT security
  • Password
  • Security
  • Telnet
  • Bad actor obtained passwords for servers, home routers, and smart devices by scanning internet for devices open to the Telnet port.

    ...more

    Critical Bug in WordPress Plugins Open Sites to Hacker Takeovers

    Published: 2019-12-13 18:33:39

    Popularity: 743

    Author: Tom Spring

    Keywords:

  • Hacks
  • Vulnerabilities
  • authentication bypass
  • Beaver Builder
  • Elementor
  • Ultimate addon
  • wordpress
  • One flaw found in WordPress plugins Ultimate Addons for Beaver Builder and Ultimate Addons for Elementor is actively being exploited.

    ...more

    D-Link Home Routers Open to Remote Takeover Will Remain Unpatched

    Published: 2019-10-08 18:53:19

    Popularity: None

    Author: Tara Seals

    LLM Says: "Router hacked"

    CVE-2019-16920 allows remote unauthenticated attackers to execute code on a target device.

    ...more

    DoorDash Data Breach Impacts Personal Data of Almost 5M Users

    Published: 2019-09-26 21:34:14

    Popularity: 436

    Author: Lindsey O'Donnell

    Keywords:

  • Breach
  • Hacks
  • data breach
  • Data Privacy
  • Data security
  • doordash
  • personal information
  • Security
  • third party provider
  • Accessed information includes delivery addresses, license numbers, names, phone numbers and more.

    ...more

    Million+ IoT Radios Open to Hijack via Telnet Backdoor

    Published: 2019-09-10 02:03:15

    Popularity: None

    Author: Tara Seals

    LLM Says: ""Radio Hack""

    Attackers can drop malware, add the device to a botnet or send their own audio streams to compromised devices.

    ...more

    Bluetooth Flaws Could Allow Global Tracking of Apple, Windows 10 Devices

    Identifying tokens and random addresses, meant to create anonymity, do not change in sync on some devices -- opening an attack vector.

    ...more

    Amazon Admits Alexa Voice Recordings Saved Indefinitely

    Published: 2019-07-03 14:40:59

    Popularity: 1920

    Author: Lindsey O'Donnell

    Keywords:

  • IoT
  • Privacy
  • Alexa
  • amazon
  • amazon Alexa privacy
  • amazon data privacy
  • apple HomePod
  • Data Privacy
  • google
  • google home
  • voice assistant devices
  • Amazon's acknowledgment that it saves Alexa voice recordings - even sometimes after consumers manually delete their interaction history - has thrust voice assistant privacy policies into the spotlight once again.

    ...more

    FDA Warns of Potentially Fatal Flaws in Medtronic Insulin Pumps

    The FDA sent out an urgent advisory warning of serious flaws in Medtronic's insulin pumps, which are used by thousands across the U.S.

    ...more

    MongoDB Leak Exposed Millions of Medical Insurance Records

    Published: 2019-06-28 19:52:31

    Popularity: 257

    Author: Lindsey O'Donnell

    Keywords:

  • Breach
  • Vulnerabilities
  • cloud
  • data exposure
  • database
  • medicaresupplement.com
  • mongodb database
  • Millions of records containing personal information and medical insurance data were exposed by a database belonging to insurance marketing website MedicareSupplement.com.

    ...more

    Intel NUC Firmware Open to Privilege Escalation, DoS and Information Disclosure

    Published: 2019-06-12 13:25:43

    Popularity: 168

    Author: Lindsey O'Donnell

    Keywords:

  • Vulnerabilities
  • high severity flaw
  • Intel
  • intel nuc
  • Intel Patch
  • mini PC
  • Next Unit of Computing
  • NUC
  • vulnerability
  • Intel has patched seven high-severity vulnerabilities in its mini PC NUC kit firmware.

    ...more

    MacOS Zero-Day Allows Trusted Apps to Run Malicious Code

    Published: 2019-06-03 12:28:42

    Popularity: 1233

    Author: Tom Spring

    Keywords:

  • Hacks
  • Privacy
  • Vulnerabilities
  • apple
  • macOS
  • Mojave
  • Patrick Wardle
  • security bypass
  • synthetic mouse clicks
  • vulnerability
  • zero-day
  • Apple 0-Day allows hackers to mimic mouse-clicks to allow malicious behavior on macOS Mojave, despite mitigations.

    ...more

    Linux Kernel Flaw Allows Remote Code-Execution

    Published: 2019-05-14 15:21:17

    Popularity: 362

    Author: Tara Seals

    Keywords:

  • Vulnerabilities
  • CVE-2019-11815
  • Kernel
  • Linux
  • race condition
  • remote code execution
  • use-after-free
  • vulnerability
  • The bug is remotely exploitable without authentication or user interaction.

    ...more

    Google Titan Security Key Recalled After Bluetooth Pairing Bug

    Published: 2019-05-15 20:01:32

    Popularity: 331

    Author: Lindsey O'Donnell

    Keywords:

  • Hacks
  • Vulnerabilities
  • Bluetooth
  • google
  • google recall
  • pairing protocol
  • Security Key
  • titan security keys
  • vulnerability
  • Google is offering free replacements for its Titan Security Key after discovering a misconfiguration in its pairing protocols.

    ...more

    High-Severity PrinterLogic Flaws Allow Remote Code Execution

    Published: 2019-05-07 01:31:10

    Popularity: None

    Author: None

    LLM Says: "Printer bomb detonated"

    The three flaws enable an unauthenticated attacker to launch remote code execution attacks on printers.

    ...more

    New 'Sodinokibi' Ransomware Exploits Critical Oracle WebLogic Flaw

    Published: 2019-04-30 23:38:56

    Popularity: None

    Author: None

    A recently-patched critical flaw in Oracle WebLogic is being actively exploited to peddle a new ransomware variant, which researchers call "Sodinokibi."

    ...more

    Android-Based Sony Smart-TVs Open to Image Pilfering

    Published: 2019-04-25 21:13:31

    Popularity: 304

    Author: Tara Seals

    Keywords:

  • IoT
  • Vulnerabilities
  • Android
  • bravia
  • photo sharing plus
  • sony smart tvs
  • vulnerabilities
  • wifi passwords
  • A pair of bugs would allow attackers to compromise the WiFi password of a TV and the multimedia stored inside it.

    ...more

    Rogue Waves: Preparing the Internet for the Next Mega DDoS Attack

    Why many attack techniques can be reused – but organizations can't defend against them.

    ...more

    Unpatched Windows Bug Allows Attackers to Spoof Security Dialog Boxes

    Microsoft won't be patching the bug, but a proof of concept shows the potential for successful malware implantation.

    ...more

    Unpatched SMB Zero Day Easily Exploitable

    Published: 2019-03-07 23:20:15

    Popularity: None

    Author: Chris Brook

    Researchers claim the unpatched SMB zero day that affects Windows can be exploited a number of ways.

    ...more

    Cisco Patches Critical IOx Vulnerability

    Published: 2019-03-07 23:09:50

    Popularity: None

    Author: Tom Spring

    Cisco Systems patched a critical vulnerability that could give an attacker root privileges to software running on two of its IoT router models.

    ...more

    APT29 Used Domain Fronting, Tor to Execute Backdoor

    Published: 2019-03-07 23:09:11

    Popularity: None

    Author: Chris Brook

    APT29, a/k/a Cozy Bear, has used Tor and a technique called domain fronting in order to secure backdoor access to targets for nearly two years running.

    ...more

    Wormable Windows Zero Day Reported to Microsoft

    Published: 2019-03-07 23:03:41

    Popularity: None

    Author: Anonymous

    Google Project Zero researchers Tavis Ormandy and Natalie Silvanovich found a remotely exploitable Windows vulnerability that Ormandy called he worst in recent memory.

    ...more

    Patches Available for Linux Sudo Vulnerability

    Published: 2019-03-07 23:01:06

    Popularity: None

    Author: Anonymous

    A high-severity vulnerability in sudo has been patched in a number of Linux distributions; the flaw allows local attackers to elevate privileges to root.

    ...more

    NSA’s EternalBlue Exploit Ported to Windows 10

    Published: 2019-03-07 23:00:35

    Popularity: None

    Author: None

    Researchers have ported the EternalBlue exploit to Windows 10, meaning that any unpatched version of Windows can be affected by the NSA attack.

    ...more

    Stack Clash Vulnerability in Linux, BSD Systems Enables Root Access

    Published: 2019-03-07 23:00:09

    Popularity: None

    Author: None

    Patches are available for a newly discovered Linux, BSD and Solaris vulnerability called Stack Clash that bypasses stack guard-page mitigations and enables root access.

    ...more

    Windows SMB Zero Day to Be Disclosed During DEF CON

    Published: 2019-03-07 22:57:03

    Popularity: None

    Author: None

    Microsoft has said it will not patch a two-decade-old Windows SMB vulnerability, called SMBloris because it behaves comparably to the Slowloris attacks. The flaw will be disclosed and demonstrated during DEF CON.

    ...more

    Mozilla Fixes 29 Vulnerabilities in Firefox, Makes Flash Click-To-Activate

    Published: 2019-03-07 22:54:35

    Popularity: None

    Author: Chris Brook

    Mozilla fixed three critical vulnerabilities and made Flash click-to-activate by default when it released Firefox 55 on Tuesday

    ...more

    Multiple Vulnerabilities Found in NVIDIA, Qualcomm, Huawei Bootloaders

    Published: 2019-03-07 22:52:35

    Popularity: None

    Author: Tom Spring

    Researchers find six previously unknown memory corruption and unlock-bypass vulnerabilities in major chipset vendors’ firmware code.

    ...more

    Microsoft Patches Critical Windows DNS Client Vulnerabilities

    Published: 2019-03-07 22:48:20

    Popularity: None

    Author: None

    Microsoft patched three memory corruption vulnerabilities in the Windows DNS client that could be abused by a man-in-the-middle attacker to run arbitrary code.

    ...more

    BoundHook Attack Exploits Intel Skylake MPX Feature

    Published: 2019-03-07 22:46:37

    Popularity: None

    Author: Tom Spring

    A new attack method takes advantage a feature in Intel’s Skylake microprocessor allowing for post-intrusion application hooking and stealth manipulation of applications.

    ...more

    Malicious Chrome Extension Steals Data Posted to Any Website

    Published: 2019-03-07 22:45:02

    Popularity: None

    Author: None

    A malicious Google Chrome extension being spread in phishing emails steals any data posted online by victims.

    ...more

    US-CERT Warns of Crypto Bugs in IEEE Standard

    Published: 2019-03-07 22:43:02

    Popularity: None

    Author: Tom Spring

    Weak cryptography in the IEEE P1735 electronics standard allow attackers to recover valuable intellectual property in plaintext from SoCs and integrated circuits.

    ...more

    Flaw Found In Dirty COW Patch

    Published: 2019-03-07 22:37:02

    Popularity: None

    Author: Tom Spring

    Researchers have found a flaw in the original fix for the Dirty COW vulnerability patched in October 2016.

    ...more

    Mozilla Patches Critical Bug in Thunderbird

    Published: 2019-03-07 22:36:47

    Popularity: None

    Author: Tom Spring

    Mozilla has patched one critical vulnerability in its Thunderbird email client along with two bugs rated high.

    ...more

    Code Used in Zero Day Huawei Router Attack Made Public

    Published: 2019-03-07 22:36:13

    Popularity: None

    Author: Tom Spring

    Researchers warn of copycat type attacks as exploit code used in Mirai variant goes public.

    ...more

    Drupal Patches Critical Bug That Leaves Platform Open to XSS Attack

    Published: 2019-03-07 22:30:08

    Popularity: None

    Author: None

    Drupal has patched several vulnerabilities – both moderately critical and critical – in two versions of its content management system platform.

    ...more

    Researchers Blame ‘Monolithic’ Linux Code Base for Critical Vulnerabilities

    Published: 2019-03-07 22:12:59

    Popularity: None

    Author: Anonymous

    Researchers contend almost all Linux OS flaws could be mitigated to less-than-critical severity with an OS design based on a verified microkernel.

    ...more

    PoC Attack Escalates MikroTik Router Bug to ‘As Bad As It Gets’

    Published: 2019-03-07 22:08:21

    Popularity: None

    Author: Tom Spring

    Researchers say a medium severity bug should now be rated critical because of a new hack technique that allows for remote code execution on MikroTik edge and consumer routers.

    ...more

    Old Printer Vulnerabilities Die Hard

    Published: 2019-03-07 22:04:29

    Popularity: None

    Author: Tom Spring

    New research on an old problem reveals despite efforts, the InfoSec professionals still have a way to go when it comes to securing printers.

    ...more

    Adobe Fixes Two Critical Acrobat and Reader Flaws

    Published: 2019-03-07 22:01:12

    Popularity: None

    Author: None

    An unscheduled patch fixed two critical flaws that could enable arbitrary code execution.

    ...more

    Lenovo Watch X Riddled with Security Vulnerabilities

    Published: 2019-03-07 21:57:28

    Popularity: None

    Author: Tom Spring

    Researchers have identified multiple security issues with this Lenovo smartwatch.

    ...more

    end