fbpx
Thursday, May 2, 2024
Make use of for wormable BlueKeep Windows bug launched into the wild

Make use of for wormable BlueKeep Windows bug launched into the...

0
Aurich Lawson For months, security practitioners have worried about the public release of attack code exploiting BlueKeep, the critical vulnerability in older versions of Microsoft Windows that’s “wormable,” meaning it can spread from computer to computer the way the WannaCry worm did two years ago. On Friday, that dreaded day arrived when the Metasploit framework—an…
Severe Magento bug will likely be made use of in the wild by card skimmers

Severe Magento bug will likely be made use of in the...

0
A critical vulnerability in the Magento e-commerce platform is putting as many as 300,000 commerce sites at risk of card-skimming infections until they install a recently released patch. PRODSECBUG-2198 is a SQL injection vulnerability that attackers can exploit with no authentication required. Hackers could exploit the flaw to take administrative control of administrator accounts, assuming…
In-the-wild Mac malware kept hectic in June– here’s a rundown

In-the-wild Mac malware kept hectic in June– here’s a rundown

0
June was a busy month for Mac malware with the active circulation of at least six threats, several of which were able to bypass security protections Apple has built into modern versions of its macOS. The latest discovery was published Friday by Mac antivirus provider Intego, which disclosed malware dubbed OSX/CrescentCore that's available through Google…
600,000 GPS trackers for individuals and animals are utilizing 123456 as a password

600,000 GPS trackers for individuals and animals are utilizing 123456 as...

0
Shenzhen i365 Tech An estimated 600,000 GPS trackers for monitoring the location of kids, seniors, and pets contain vulnerabilities that open users up to a host of creepy attacks, researchers from security firm Avast have found. The $25 to $50 devices are small enough to wear on a necklace or stash in a pocket or…
Serial publisher of Windows 0-days drops exploits for 3 more unfixed defects

Serial publisher of Windows 0-days drops exploits for 3 more unfixed...

0
A serial publisher of Microsoft zeroday vulnerabilities has dropped exploit code for three more unpatched flaws, marking the seventh time the unknown person has done so in the past year. Technical details of the vulnerabilities, along with working proof-of-concept exploits, are the work of someone using the moniker SandBoxEscaper. A local privilege-escalation vulnerability in the…
Hackers are exploiting a server vulnerability with a severity of 9.8 out of 10

Hackers are exploiting a server vulnerability with a severity of 9.8...

0
Getty Images In a development security pros feared, attackers are actively targeting yet another set of critical server vulnerabilities that leave corporations and governments open to serious network intrusions. The vulnerability this time is in BIG-IP, a line of server appliances sold by Seattle-based F5 Networks. Customers use BIG-IP servers to manage traffic going into…
Microsoft alerts wormable Windows bug might result in another WannaCry

Microsoft alerts wormable Windows bug might result in another WannaCry

0
Microsoft is warning that the Internet could see another exploit with the magnitude of the WannaCry attack that shut down computers all over the world two years ago unless people patch a high-severity vulnerability. The software maker took the unusual step of backporting the just-released patch for Windows 2003 and XP, which haven’t been supported…
The wave of domain hijackings beleaguering the Web is even worse than we believed

The wave of domain hijackings beleaguering the Web is even worse...

0
Enlarge / Artist's impression of state-sponsored "Sea Turtle" hacking campaign. Chunumunu / Getty Images The wave of domain hijacking attacks besetting the Internet over the past few months is worse than previously thought, according to a new report that says state-sponsored actors have continued to brazenly target key infrastructure despite growing awareness of the operation.…
Nasty WinRAR bug is being actively made use of to set up hard-to-detect malware

Nasty WinRAR bug is being actively made use of to set...

0
Malicious hackers wasted no time exploiting a nasty code-execution vulnerability recently disclosed in WinRAR, a Windows file-compression program with 500 million users worldwide. The in-the-wild attacks install malware that, at the time this post was going live, was undetected by the vast majority of antivirus product. The flaw, disclosed last month by Check Point Research,…
LibreOffice and Apache OpenOffice susceptible to very same bug; just one is repaired

LibreOffice and Apache OpenOffice susceptible to very same bug; just one...

0
LibreOffice, an open source clone of Microsoft Office, has patched a bug that allowed attackers to execute commands of their choosing on vulnerable computers. A similar flaw in Apache OpenOffice remains unfixed. Austrian researcher Alex Inführ publicly reported the vulnerability on Friday, shortly after it was fixed in LibreOffice. His disclosure included a proof-of-concept exploit…

Recent Posts