Hackers are Scanning for Unpatched Exchange Servers Flaws

Hackers are Scanning for Unpatched Exchange Servers Flaws

Threat actors exploit a new set of vulnerabilities in their campaigns after abusing the ProxyLogon flaws trio

SharePoint File-Shares Exploited in Phishing Campaign

SharePoint File-Shares Exploited in Phishing Campaign

Attackers have spoofed sender addresses to look legitimate

Unknown User Accounts Can be Used to Hack Zyxel Firewalls and VPNs

Unknown User Accounts Can be Used to Hack Zyxel Firewalls and VPNs

Hackers can exploit network security devices

Bluetooth Devices Vulnerable to AuthValue Disclosure

Bluetooth Devices Vulnerable to AuthValue Disclosure

BIAS enables attackers to exploit devices

Researcher Finds Steam 0Day Exploit, Valve Ignores It, Exploit Becomes Public

Researcher Finds Steam 0Day Exploit, Valve Ignores It, Exploit Becomes Public

As it stands right now, Steam users are still vulnerable

Almost 50 Percent of 2018 Vulnerabilities Can Be Exploited Remotely

Almost 50 Percent of 2018 Vulnerabilities Can Be Exploited Remotely

Roughly 30% of reported vulnerabilities have public exploits

Sony Fixed PlayStation 4 Message Exploit Leading to a DoS Condition

Sony Fixed PlayStation 4 Message Exploit Leading to a DoS Condition

Console bricking message actually sent them into crash loop

Multiple Code Execution Vulnerabilities Found in Atlantis Word Processor

Multiple Code Execution Vulnerabilities Found in Atlantis Word Processor

Vendor released patched version after disclosure

GandCrab Ransomware Spreads Using Multiple Known Vulnerabilities

GandCrab Ransomware Spreads Using Multiple Known Vulnerabilities

The malware forces reboot to start encrypting the disk

  • Security
  • By Sergiu Gatlan
  • September 28th, 2018
IC3 Alerts of Increasing Danger of RDP Exploitation Attacks

IC3 Alerts of Increasing Danger of RDP Exploitation Attacks

Threat actors use RDP exploits for ransomware and data theft

  • Security
  • By Sergiu Gatlan
  • September 21st, 2018
Cisco Video Surveillance Manager Allows Attackers to Login as Root

Cisco Video Surveillance Manager Allows Attackers to Login as Root

Cisco left default static credentials on preinstalled VSMs

  • Security
  • By Sergiu Gatlan
  • September 21st, 2018
Off-Path TCP Exploit Allows Attackers to Steal Data via Unencrypted Connections

Off-Path TCP Exploit Allows Attackers to Steal Data via Unencrypted Connections

All routers are vulnerable, encryption the only protection

  • Security
  • By Sergiu Gatlan
  • September 14th, 2018
Persistent EternalBlue-Powered Wannamine Cryptominer Still Alive

Persistent EternalBlue-Powered Wannamine Cryptominer Still Alive

Hundreds of thousands of computers still vulnerable

  • Security
  • By Sergiu Gatlan
  • September 10th, 2018
Zero-Day Tor Browser Exploit Bypassed NoScript to Execute Malicious Code

Zero-Day Tor Browser Exploit Bypassed NoScript to Execute Malicious Code

Bug fixed by NoScript developer four hours later

Nvidia Tegra X1 Coldboot Vulnerability Lets Anyone Hack a Nintendo Switch

Nvidia Tegra X1 Coldboot Vulnerability Lets Anyone Hack a Nintendo Switch

An unpatchable flaw was found in Nvidia Tegra X1 chip

PlayStation 4 (4.55) Public WebKit Exploit Now Works with Latest 5.50 Firmware

PlayStation 4 (4.55) Public WebKit Exploit Now Works with Latest 5.50 Firmware

Could let you run Linux on your PlayStation 4 (5.50)

  • Linux
  • By Marius Nestor
  • March 6th, 2018
You Can Now Run Linux on Sony's PlayStation 4 (4.55) Gaming Console, Here's How

You Can Now Run Linux on Sony's PlayStation 4 (4.55) Gaming Console, Here's How

You need to have a PlayStation 4 with firmware 4.05 or 4.55

 
Want more? Browse: