Search Results For: attacker

End-of-life hardware can be quite the problem at times, evencrashing back into Earths atmosphere at supersonic speeds for that matter. Of course, we wouldnt expect such travesties happening with the hardware you keep in your basement, or that NAS you tucked away your closet. However, older tech gear can have serious... Read more...
This week, researchers have reported that earlier this year, threat actors leveraged a vulnerability in Windows to deploy DarkGate malware after phishing the victim for initial access. The vulnerability tracked as CVE-2024-21412 led to users running fake Microsoft software installer (.MSI) packages that looked like... Read more...
Researchers have shown that running a man-in-the-middle attack against a Tesla owner can potentially compromise their account, unlock their car, and ultimately allow threat actors to drive away with it. There are, of coruse, a number a caveats. Much of this hinges on some social engineering, and tricking the Tesla owner to use a spoofed Wi-Fi Read more...
Apple has released its highly anticipated iOS 17.4 update, bringing new emojis, better battery health tracking, and more. Those in Europe are being treated to something extra, as Apple has made changes to the App Store ahead of the deadline for companies to comply with the Digital Markets Act (DMA) in the European... Read more...
Researchers and tourists on board two vessels captured a rare event of a single killer whale, also known as an orca whale, attacking a juvenile white sharkand killing it in under 2 minutes. The video footage highlighted the predatory proficiency of the killer whale, which took out the great white and ultimately ate... Read more...
Most forms of malware can only make the attacker money in a roundabout way. For example, selling stolen data or bundling infected systems into a rentable botnet. Ransomware is different, however, in that it can be a moneymaker all on its own, and that's why infections haveincreased every year. IBM has debuted a... Read more...
It turns out that you do not need Chinese backdoors in products if people are just installing IoT devices with poor security. This is evidenced by a recent report regarding video doorbells manufactured by a Chinese company, which can be easily compromised. Further, these doorbells are sold around the United States at... Read more...
Virtually all smartphone users around the globe charge their devices daily, either via a wired charger or wireless charging pad. It turn out, however, that wireless chargers can be used to do some pretty nefarious things. Researchers have recently shown that it's possible to manipulate or even destroy devices by... Read more...
Though you may think your home network is secure, attackers may be able to sneak in through your web browser and leverage vulnerabilities to pivot to internal devices. This is especially true for Internet of Things (IoT) equipment, which is notoriously insecure, requiring regular patches or even warnings from... Read more...
The federal government has quite the security doozy on its hands going into an election year, with events like Super Bowl LVIII going on as well. However, this is nothing that cannot be handled by an interagency task force dedicated to the physical and digital protection of Super Bowl LVIII patrons, participants, and... Read more...
Windows has had some recent security issues, but Microsoft has gnerally been good about offering critical fixes. A problem comes when people don't actually apply those fixes to make their systems more secure. As such, TrendMicro has discovered a previously-patched vulnerability being exploited on Windows devices to... Read more...
In 2021 the Framework laptop hit the market, revolutionizing the standard laptop model from being a one-and-done sort of deal to an upgradable and modular experience. Since then, the brand has expanded quite a bit. With several releases and reiterations, like the recent AMD Ryzen upgrade across the 13 and 16 models... Read more...
Password managers are not perfect. Recently,LastPass was blamed for millions in stolen neing crypto and KeePass is downplaying password database theft. Bitwarden may ne next to catch some flak. It turns out a penetration test discovered that unlocking a password vault with Windows Hello biometrics could be bypassed... Read more...
Downfall, a standalone steam mod for the popular Slay the Spire game, got hit with a security breach on Christmas day. An attacker replaced the legitimate game download with a malicious one, which was available to users on Steams library for roughly an hour. However, the mods developer is now back in control... Read more...
Earlier in the year, Apple fixed several vulnerabilities, which, when exploited, allowed Operation Triangulation spyware to make its way onto devices with zero interaction required. Since then, researchers have been uncovering all the components that made up the attack chain for the spyware campaign, and what they... Read more...
If you've acquired a new Apple product recently this shopping season, you'll want to pay special attention to the latest critical update that has been released. While the plethora of new iPhone, iPad, and Mac buyers are enjoying their brand new devices, a potential danger lurks underneath. Apple has a new patch for... Read more...
If you're using a Chrome browserand chances are high that you are, simply based on Chrome's dominant market sharestop what you're doing and initiate an update to the latest version. Yes, you should be receiving Chrome updates on an automatic basis, but the newest build patches a bunch of alarming security... Read more...
A security vulnerability found in ownCloud, a provider of open-source software solutions for organizations to host and sync files, is now being actively exploited by threat actors. The vulnerability, CVE-2023-49103, was initially disclosed by ownCloud on November 21, 2023 whereupon it was assessed as being a critical... Read more...
The Nothing Chats beta app is no longer available in the Play Store, after a surprising number of security and privacy concerns have come to light. The messaging application was released by Nothing as a way to better connect Android and iPhone users, because at the moment, cross platform chats offer asomehwat limited... Read more...
WP Fastest Cache, a WordPress plugin currently in use by over 1 million users that assists in more efficiently delivering their websites, is addressing a security issue with its 1.2.2 release. This update addresses an SQL injection vulnerability found during an internal review by the WPScan team. The vulnerability... Read more...
Software vulnerabilities come and go, but vulnerabilities found in hardware are significantly harder to deal with and lead to more problems, such as with Hertzbleed and that family of security issues that sprung up from simple clock management techniques. Now, researchers have found a new problem with AMD EPYC... Read more...
Microsoft Exchange has quite a storied history of security vulnerabilities and breaches given its widespread usage in the corporate world. While there has not been much news regarding Exchange for a while, the Zero Day Initiative has found four vulnerabilities that, while not absolutely critical, could still pose a... Read more...
1 2 3 4 5 Next