In March, a North Korean APT siphoned blockchain gaming platform Axie Infinity of $540M.
...moreTotal Articles Found: 94
Top sources:
Top Keywords:
Top Authors
Top Articles:
In March, a North Korean APT siphoned blockchain gaming platform Axie Infinity of $540M.
...morePublished: 2022-06-17 13:34:04
Popularity: 57
Author: Nate Nelson
Keywords:
Evidence suggests that a just-discovered APT has been active since 2013.
...morePublished: 2022-05-19 13:03:37
Popularity: 238
Author: Elizabeth Montalbano
Keywords:
Privilege escalation flaw discovered in the Jupiter and JupiterX Core Plugin affects more than 90,000 sites.
...moreMicrosoft Word also leveraged in the email campaign, which uses a 22-year-old Office RCE bug.
...morePublished: 2022-05-04 10:27:47
Popularity: 97
Author: Elizabeth Montalbano
Keywords:
A flaw in all versions of the popular C standard libraries uClibe and uClibe-ng can allow for DNS poisoning attacks against target devices.
...morePublished: 2022-04-27 12:11:25
Popularity: 70
Author: Elizabeth Montalbano
Keywords:
Four months after the critical flaw was discovered, attackers have a massive attack surface from which they can exploit the flaw and take over systems, researchers found.
...moreNo government and customer data was accessed.
...morePublished: 2022-03-29 20:33:08
Popularity: 52
Author: Lisa Vaas
Keywords:
Researchers have found three backdoors and four miners in attacks exploiting the Log4Shell vulnerability, some of which are still ongoing.
...morePublished: 2022-01-21 18:19:37
Popularity: 34
Author: Becky Bracken
Keywords:
The WordPress WP HTML Mail plugin for personalized emails is vulnerable to code injection and phishing due to XSS.
...morePublished: 2021-11-05 17:00:57
Popularity: 932
Author: Lisa Vaas
Keywords:
CISA is urging vendors to patch, given the release of public exploit code & a proof of concept tool for bugs that open billions of devices – phones, PCs, toys, etc. – to DoS & code execution.
...morePublished: 2021-11-08 16:38:05
Popularity: 36
Author: Lisa Vaas
Keywords:
Researchers have spotted a second, worldwide campaign exploiting the Zoho zero-day: one that’s breached defense, energy and healthcare organizations.
...morePublished: 2021-11-02 17:20:42
Popularity: 49
Author: Lisa Vaas
Keywords:
Google’s Android November 2021 security updates plug 18 flaws in the framework and system components and 18 more in the kernel and vendor components.
...morePublished: 2021-10-18 16:23:21
Popularity: 88
Author: Lisa Vaas
Keywords:
The accounts were used to catfish security researchers into downloading malware in a long-running cyber-espionage campaign attributed to North Korea.
...morePublished: 2021-10-01 20:08:23
Popularity: 191
Author: Lisa Vaas
Keywords:
Coinbase suspects phishing led to attackers getting personal details needed to access wallets but also blamed a flaw in its SMS-based 2FA.
...morePublished: 2021-09-29 20:48:33
Popularity: 177
Author: Tara Seals
Keywords:
Apple's personal item-tracker devices can be used to deliver malware, slurp credentials, steal tokens and more thanks to XSS.
...moreAdobe releases security updates for 59 bugs affecting its core products, including Adobe Acrobat Reader, XMP Toolkit SDK and Photoshop.
...morePublished: 2021-09-09 14:30:56
Popularity: 115
Author: Lisa Vaas
Keywords:
Grayfly campaigns have launched the novel malware against businesses in Taiwan, Vietnam, the US and Mexico and are targeting Exchange and MySQL servers.
...morePublished: 2021-09-09 16:39:13
Popularity: 147
Author: Tara Seals
Keywords:
A chain of exploits could allow a malicious Azure user to infiltrate other customers' cloud instances within Microsoft's container-as-a-service offering.
...morePublished: 2021-09-09 22:49:27
Popularity: 39
Author: Lisa Vaas
Keywords:
They were posted for free by former Babuk gang members who’ve bickered, squabbled and huffed off to start their own darn ransomware businesses, dagnabbit.
...morePublished: 2021-08-18 13:19:15
Popularity: 1210
Author: Yaron Kassner
Keywords:
Yaron Kassner, CTO at Silverfort, discusses authentication-bypass bugs in Cisco ASA, F5 Big-IP, IBM QRadar and Palo Alto Networks PAN-OS.
...morePublished: 2021-08-12 20:10:33
Popularity: None
Author: Tara Seals
The out-of-band warning pairs with a working proof-of-concept exploit for the issue, circulating since mid-July.
...moreThe newborn platform was inundated by Sonic the Hedgehog-themed porn and had prominent users' profiles defaced. Next, hackers posted its user database online.
...moreThe driver, called "Netfilter," is a rootkit that talks to Chinese C2 IPs and aims to spoof gamers' geo-locations to cheat the system and play from anywhere, Microsoft said.
...moreThe 9.4-rated bug in AppC could give attackers admin rights, no authentication required, letting them attack anything from PoS to industrial control systems.
...morePublished: 2021-06-08 19:02:25
Popularity: 68
Author: Tara Seals
Keywords:
Google's June security bulletin addresses 90+ bugs in Android and Pixel devices.
...morePublished: 2021-05-14 11:00:02
Popularity: None
Author: Anonymous
The ‘Send My’ exploit can use Apple's locator service to collect and send information from nearby devices for later upload to iCloud servers.
...morePublished: 2021-05-12 11:19:06
Popularity: None
Author: Tom Spring
A patch for Adobe Acrobat, the world’s leading PDF reader, fixes a vulnerability under active attack affecting both Windows and macOS systems that could lead to arbitrary code execution.
...morePublished: 2021-03-18 15:52:29
Popularity: 268
Author: Lindsey O'Donnell
Keywords:
A glitch in Zoom's screen-sharing feature shows parts of presenters' screens that they did not intend to share - potentially leaking emails or passwords.
...morePublished: 2021-03-18 11:50:44
Popularity: 113
Author: Tara Seals
Keywords:
The popular learning-management system for teacher-student communication is rife with SQL-injection vulnerabilities.
...morePublished: 2021-03-10 11:55:14
Popularity: None
Author: None
The critical flaws exist in Adobe Framemaker, Connect and the Creative Cloud desktop application for Windows.
...morePublished: 2021-02-08 21:11:57
Popularity: 124
Author: Lindsey O'Donnell
Keywords:
A patch in the NextGen Gallery WordPress plugin fixes critical and high-severity cross-site request forgery flaws.
...morePublished: 2021-02-09 19:40:47
Popularity: 643
Author: Lindsey O'Donnell
Keywords:
A critical vulnerability in Adobe Reader has been exploited in "limited attacks."
...morePublished: 2021-02-16 16:50:35
Popularity: 302
Author: Tara Seals
Keywords:
Hundreds of thousands of individuals are potentially affected by this vulnerability.
...moreIntel is warning on security bugs across its graphics drivers, server boards, compute modules and modems.
...morePublished: 2021-02-05 22:20:20
Popularity: 133
Author: Tara Seals
Keywords:
An CRSF-to-stored-XSS security bug plagues 50,000 'Contact Form 7' Style users.
...moreThe by-now infamous company has issued patches for three security vulnerabilities in total.
...morePublished: 2021-01-27 20:32:55
Popularity: 440
Author: Tara Seals
Keywords:
A new version of NAT slipstreaming allows cybercriminals an easy path to devices that aren't connected to the internet.
...morePublished: 2021-01-27 18:05:51
Popularity: 227
Author: Lindsey O'Donnell
Keywords:
Researchers publicly disclosed flaws in ADT's LifeShield DIY HD Video Doorbell, which could have allowed local attackers to access credentials, video feeds and more.
...morePublished: 2021-01-27 12:21:28
Popularity: 1153
Author: Elizabeth Montalbano
Keywords:
An anonymous researcher identified bugs in the software’s kernel and WebKit browser engine that are likely part of an exploit chain.
...morePublished: 2021-01-05 20:21:40
Popularity: 394
Author: Lindsey O'Donnell
Keywords:
Google's Android security update addressed 43 bugs overall affecting Android handsets, including Samsung phones.
...morePublished: 2020-11-18 21:53:55
Popularity: 172
Author: Tara Seals
Keywords:
WordPress websites using buggy Epsilon Framework themes are being hunted by hackers.
...morePublished: 2020-08-05 16:14:26
Popularity: 124
Author: Lindsey O'Donnell
Keywords:
Google addressed high-severity and critical flaws tied to 54 CVEs in this month's Android security bulletin.
...morePublished: 2020-07-30 17:00:13
Popularity: 265
Author: Tara Seals
Keywords:
The malware is a new payload that uses Dogecoin wallets for its C2, and spreads via the Ngrok botnet.
...morePublished: 2020-07-30 21:40:31
Popularity: 146
Author: Lindsey O'Donnell
Keywords:
Zoom has fixed the issue, which stemmed from a lack of checks against incorrect passcode attempts.
...morePublished: 2020-07-07 14:44:30
Popularity: 550
Author: Tara Seals
Keywords:
Admins should patch their Citrix ADC and Gateway installs immediately.
...morePublished: 2020-07-02 16:14:46
Popularity: 117
Author: Tara Seals
Keywords:
Several vulnerabilities can be chained together for a full exploit.
...morePublished: 2020-06-16 19:29:09
Popularity: 205
Author: Lindsey O'Donnell
Keywords:
Critical vulnerabilities were patched in Adobe After Effects, Illustrator, Premiere Pro, Premiere Rush and Audition.
...morePublished: 2020-06-10 18:37:53
Popularity: 138
Author: Lindsey O'Donnell
Keywords:
Two critical flaws in Intel AMT, which could enable privilege escalation, were patched along with 20 other bugs in its June security update.
...morePublished: 2020-06-04 17:02:34
Popularity: 372
Author: Lindsey O'Donnell
Keywords:
The end-to-end encryption feature will not be offered to free users, Zoom's CEO said, in case Zoom needed to comply with federal and local law enforcement.
...morePublished: 2020-05-01 00:09:53
Popularity: None
Author: Tara Seals
Researchers say the bugs are easy to exploit and will likely be weaponized within a day.
...morePublished: 2020-04-30 00:05:53
Popularity: None
Author: None
A GitLab path traversal flaw could allow attackers to read arbitrary files and remotely execute code.
...morePublished: 2020-02-27 04:07:18
Popularity: 990
Author: Tara Seals
Keywords:
The Kr00k bug arises from an all-zero encryption key in Wi-Fi chips that reveals communications from devices from Amazon, Apple, Google, Samsung and others.
...morePublished: 2020-01-29 19:56:14
Popularity: 135
Author: Tara Seals
Keywords:
After a year of big changes, white hats reaped more from Google's programs than ever before.
...morePublished: 2020-01-21 11:57:20
Popularity: 568
Author: Elizabeth Montalbano
Keywords:
Bad actor obtained passwords for servers, home routers, and smart devices by scanning internet for devices open to the Telnet port.
...morePublished: 2019-12-13 18:33:39
Popularity: 743
Author: Tom Spring
Keywords:
One flaw found in WordPress plugins Ultimate Addons for Beaver Builder and Ultimate Addons for Elementor is actively being exploited.
...morePublished: 2019-10-08 18:53:19
Popularity: None
Author: Tara Seals
CVE-2019-16920 allows remote unauthenticated attackers to execute code on a target device.
...morePublished: 2019-09-26 21:34:14
Popularity: 436
Author: Lindsey O'Donnell
Keywords:
Accessed information includes delivery addresses, license numbers, names, phone numbers and more.
...morePublished: 2019-09-10 02:03:15
Popularity: None
Author: Tara Seals
Attackers can drop malware, add the device to a botnet or send their own audio streams to compromised devices.
...morePublished: 2019-07-17 17:29:58
Popularity: 531
Author: Tara Seals
Keywords:
Identifying tokens and random addresses, meant to create anonymity, do not change in sync on some devices -- opening an attack vector.
...morePublished: 2019-07-03 14:40:59
Popularity: 1920
Author: Lindsey O'Donnell
Keywords:
Amazon's acknowledgment that it saves Alexa voice recordings - even sometimes after consumers manually delete their interaction history - has thrust voice assistant privacy policies into the spotlight once again.
...morePublished: 2019-06-28 15:14:43
Popularity: 259
Author: Lindsey O'Donnell
Keywords:
The FDA sent out an urgent advisory warning of serious flaws in Medtronic's insulin pumps, which are used by thousands across the U.S.
...morePublished: 2019-06-28 19:52:31
Popularity: 257
Author: Lindsey O'Donnell
Keywords:
Millions of records containing personal information and medical insurance data were exposed by a database belonging to insurance marketing website MedicareSupplement.com.
...morePublished: 2019-06-12 13:25:43
Popularity: 168
Author: Lindsey O'Donnell
Keywords:
Intel has patched seven high-severity vulnerabilities in its mini PC NUC kit firmware.
...morePublished: 2019-06-03 12:28:42
Popularity: 1233
Author: Tom Spring
Keywords:
Apple 0-Day allows hackers to mimic mouse-clicks to allow malicious behavior on macOS Mojave, despite mitigations.
...morePublished: 2019-05-14 15:21:17
Popularity: 362
Author: Tara Seals
Keywords:
The bug is remotely exploitable without authentication or user interaction.
...morePublished: 2019-05-15 20:01:32
Popularity: 331
Author: Lindsey O'Donnell
Keywords:
Google is offering free replacements for its Titan Security Key after discovering a misconfiguration in its pairing protocols.
...morePublished: 2019-05-07 01:31:10
Popularity: None
Author: None
The three flaws enable an unauthenticated attacker to launch remote code execution attacks on printers.
...morePublished: 2019-04-30 23:38:56
Popularity: None
Author: None
A recently-patched critical flaw in Oracle WebLogic is being actively exploited to peddle a new ransomware variant, which researchers call "Sodinokibi."
...morePublished: 2019-04-25 21:13:31
Popularity: 304
Author: Tara Seals
Keywords:
A pair of bugs would allow attackers to compromise the WiFi password of a TV and the multimedia stored inside it.
...morePublished: 2019-04-15 12:07:03
Popularity: 242
Author: Tony Lauro
Keywords:
Why many attack techniques can be reused – but organizations can't defend against them.
...morePublished: 2019-03-12 15:09:12
Popularity: 92
Author: Tara Seals
Keywords:
Microsoft won't be patching the bug, but a proof of concept shows the potential for successful malware implantation.
...morePublished: 2019-03-07 23:20:15
Popularity: None
Author: Chris Brook
Researchers claim the unpatched SMB zero day that affects Windows can be exploited a number of ways.
...morePublished: 2019-03-07 23:09:50
Popularity: None
Author: Tom Spring
Cisco Systems patched a critical vulnerability that could give an attacker root privileges to software running on two of its IoT router models.
...morePublished: 2019-03-07 23:09:11
Popularity: None
Author: Chris Brook
APT29, a/k/a Cozy Bear, has used Tor and a technique called domain fronting in order to secure backdoor access to targets for nearly two years running.
...morePublished: 2019-03-07 23:03:41
Popularity: None
Author: Anonymous
Google Project Zero researchers Tavis Ormandy and Natalie Silvanovich found a remotely exploitable Windows vulnerability that Ormandy called he worst in recent memory.
...morePublished: 2019-03-07 23:01:06
Popularity: None
Author: Anonymous
A high-severity vulnerability in sudo has been patched in a number of Linux distributions; the flaw allows local attackers to elevate privileges to root.
...morePublished: 2019-03-07 23:00:35
Popularity: None
Author: None
Researchers have ported the EternalBlue exploit to Windows 10, meaning that any unpatched version of Windows can be affected by the NSA attack.
...morePublished: 2019-03-07 23:00:09
Popularity: None
Author: None
Patches are available for a newly discovered Linux, BSD and Solaris vulnerability called Stack Clash that bypasses stack guard-page mitigations and enables root access.
...morePublished: 2019-03-07 22:57:03
Popularity: None
Author: None
Microsoft has said it will not patch a two-decade-old Windows SMB vulnerability, called SMBloris because it behaves comparably to the Slowloris attacks. The flaw will be disclosed and demonstrated during DEF CON.
...morePublished: 2019-03-07 22:54:35
Popularity: None
Author: Chris Brook
Mozilla fixed three critical vulnerabilities and made Flash click-to-activate by default when it released Firefox 55 on Tuesday
...morePublished: 2019-03-07 22:52:35
Popularity: None
Author: Tom Spring
Researchers find six previously unknown memory corruption and unlock-bypass vulnerabilities in major chipset vendors’ firmware code.
...morePublished: 2019-03-07 22:48:20
Popularity: None
Author: None
Microsoft patched three memory corruption vulnerabilities in the Windows DNS client that could be abused by a man-in-the-middle attacker to run arbitrary code.
...morePublished: 2019-03-07 22:46:37
Popularity: None
Author: Tom Spring
A new attack method takes advantage a feature in Intel’s Skylake microprocessor allowing for post-intrusion application hooking and stealth manipulation of applications.
...morePublished: 2019-03-07 22:45:02
Popularity: None
Author: None
A malicious Google Chrome extension being spread in phishing emails steals any data posted online by victims.
...morePublished: 2019-03-07 22:43:02
Popularity: None
Author: Tom Spring
Weak cryptography in the IEEE P1735 electronics standard allow attackers to recover valuable intellectual property in plaintext from SoCs and integrated circuits.
...morePublished: 2019-03-07 22:37:02
Popularity: None
Author: Tom Spring
Researchers have found a flaw in the original fix for the Dirty COW vulnerability patched in October 2016.
...morePublished: 2019-03-07 22:36:47
Popularity: None
Author: Tom Spring
Mozilla has patched one critical vulnerability in its Thunderbird email client along with two bugs rated high.
...morePublished: 2019-03-07 22:36:13
Popularity: None
Author: Tom Spring
Researchers warn of copycat type attacks as exploit code used in Mirai variant goes public.
...morePublished: 2019-03-07 22:30:08
Popularity: None
Author: None
Drupal has patched several vulnerabilities – both moderately critical and critical – in two versions of its content management system platform.
...morePublished: 2019-03-07 22:12:59
Popularity: None
Author: Anonymous
Researchers contend almost all Linux OS flaws could be mitigated to less-than-critical severity with an OS design based on a verified microkernel.
...morePublished: 2019-03-07 22:08:21
Popularity: None
Author: Tom Spring
Researchers say a medium severity bug should now be rated critical because of a new hack technique that allows for remote code execution on MikroTik edge and consumer routers.
...morePublished: 2019-03-07 22:04:29
Popularity: None
Author: Tom Spring
New research on an old problem reveals despite efforts, the InfoSec professionals still have a way to go when it comes to securing printers.
...morePublished: 2019-03-07 22:01:12
Popularity: None
Author: None
An unscheduled patch fixed two critical flaws that could enable arbitrary code execution.
...morePublished: 2019-03-07 21:57:28
Popularity: None
Author: Tom Spring
Researchers have identified multiple security issues with this Lenovo smartwatch.
...more