- Security
- By George Dascalu
- August 14th, 2021
Hackers are Scanning for Unpatched Exchange Servers Flaws
Threat actors exploit a new set of vulnerabilities in their campaigns after abusing the ProxyLogon flaws trio
- Security
- By George Dascalu
- August 5th, 2021
SharePoint File-Shares Exploited in Phishing Campaign
Attackers have spoofed sender addresses to look legitimate
- Security
- By George Dascalu
- June 25th, 2021
Unknown User Accounts Can be Used to Hack Zyxel Firewalls and VPNs
Hackers can exploit network security devices
- Security
- By George Dascalu
- May 25th, 2021
Bluetooth Devices Vulnerable to AuthValue Disclosure
BIAS enables attackers to exploit devices
- Security
- By Silviu Stahie
- August 9th, 2019
Researcher Finds Steam 0Day Exploit, Valve Ignores It, Exploit Becomes Public
As it stands right now, Steam users are still vulnerable
- Security
- By Sergiu Gatlan
- November 20th, 2018
Almost 50 Percent of 2018 Vulnerabilities Can Be Exploited Remotely
Roughly 30% of reported vulnerabilities have public exploits
- Security
- By Sergiu Gatlan
- October 16th, 2018
Sony Fixed PlayStation 4 Message Exploit Leading to a DoS Condition
Console bricking message actually sent them into crash loop
- Security
- By Sergiu Gatlan
- October 1st, 2018
Multiple Code Execution Vulnerabilities Found in Atlantis Word Processor
Vendor released patched version after disclosure
- Security
- By Sergiu Gatlan
- October 1st, 2018
GandCrab Ransomware Spreads Using Multiple Known Vulnerabilities
The malware forces reboot to start encrypting the disk
- Security
- By Sergiu Gatlan
- September 28th, 2018
IC3 Alerts of Increasing Danger of RDP Exploitation Attacks
Threat actors use RDP exploits for ransomware and data theft
- Security
- By Sergiu Gatlan
- September 21st, 2018
Cisco Video Surveillance Manager Allows Attackers to Login as Root
Cisco left default static credentials on preinstalled VSMs
- Security
- By Sergiu Gatlan
- September 21st, 2018
Off-Path TCP Exploit Allows Attackers to Steal Data via Unencrypted Connections
All routers are vulnerable, encryption the only protection
- Security
- By Sergiu Gatlan
- September 14th, 2018
Persistent EternalBlue-Powered Wannamine Cryptominer Still Alive
Hundreds of thousands of computers still vulnerable
- Security
- By Sergiu Gatlan
- September 10th, 2018
Zero-Day Tor Browser Exploit Bypassed NoScript to Execute Malicious Code
Bug fixed by NoScript developer four hours later
- Security
- By Marius Nestor
- April 23rd, 2018
Nvidia Tegra X1 Coldboot Vulnerability Lets Anyone Hack a Nintendo Switch
An unpatchable flaw was found in Nvidia Tegra X1 chip
- Security
- By Marius Nestor
- March 12th, 2018
PlayStation 4 (4.55) Public WebKit Exploit Now Works with Latest 5.50 Firmware
Could let you run Linux on your PlayStation 4 (5.50)
- Linux
- By Marius Nestor
- March 6th, 2018
You Can Now Run Linux on Sony's PlayStation 4 (4.55) Gaming Console, Here's How
You need to have a PlayStation 4 with firmware 4.05 or 4.55