Items tagged with vulnerability
by
Nathan Wasson - Mon, Sep 12, 2022
Research conducted by a team at the firmware security firm Binarly reveals that six vulnerabilities remain unpatched in various enterprise-grade HP laptops and desktops despite HP having developed patches for these vulnerabilities. Binarly...
Read more...
by
Nathan Wasson - Thu, Sep 01, 2022
A new report by Microsoft details a vulnerability in the TikTok Android app that threat actors could have exploited to hijack user accounts with a single click. The vulnerability appears in the National Vulnerability Database with the...
Read more...
by
Nathan Wasson - Wed, Aug 10, 2022
Microsoft has finally released a security update that addresses a zero-day vulnerability that went unpatched for more than two years. The vulnerability, known as DogWalk, appears in the national vulnerability index as CVE-2022-34713...
Read more...
by
Lane Babuder - Tue, May 17, 2022
May 2022 has not been a good month for operating system updates. Microsoft had a problem with Active Directory and later driver crash blue screens of death (BSoD). Now it appears Apple has zero-day security exploit problems affecting many...
Read more...
by
Nathan Wasson - Mon, Jan 31, 2022
A security researcher who goes by the name “RyeLv” recently discovered an elevation of privilege vulnerability in Windows. Microsoft has publicly disclosed the vulnerability and registered it in the Common Vulnerabilities and Exposures...
Read more...
by
Nathan Ord - Sun, Nov 07, 2021
Nearly eight and a half years ago, Intel launched its 4th Generation Intel Core Processors, codenamed Haswell. In that time, researchers have discovered a number of security vulnerabilities that can typically be addressed via software and...
Read more...
by
Nathan Ord - Sat, Oct 02, 2021
In mid-September, Google patched some actively exploited zero-day vulnerabilities discovered in Google Chrome. Now, the web search giant has done it again with several new security fixes in the 11th hour of September, and you should patch right now.
Published on Thursday, the stable channel...
Read more...
by
Nathan Ord - Sun, Aug 01, 2021
Earlier in July, the PrintNightmare vulnerability was discovered, wherein a threat actor could exploit the vulnerability to gain system-level access to a device. This was only speculation at first, but that has now changed, as...
Read more...
by
Nathan Ord - Mon, Jul 26, 2021
Hackers and threat actors are constantly searching for new ways to breach systems for cybersecurity research or exploitation, respectively. Thankfully, French researcher Gilles Lionel got to an NTLM Relay Attack, dubbed PetitPotam, first...
Read more...
by
Nathan Ord - Tue, Jul 20, 2021
Whether it’s a typo, a line of code in the wrong place, or a placeholder for testing that never got removed, developers can introduce vulnerabilities into apps that a threat actor could exploit. It seems Android developers seem to have the...
Read more...
by
Nathan Ord - Fri, Jul 02, 2021
Over the last couple of days, a vulnerability tracked as CVE-2021-34527 has made the rounds, making IT people quite nervous. The cybersecurity threat, also dubbed PrintNightmare, exploits a flaw within the Windows Print Spooler, allowing...
Read more...
by
Nathan Ord - Fri, Jun 25, 2021
If you own a Western Digital My Book Live, unplug it from the internet as soon as possible. WD has reported that people have been waking up to find their My Book Live devices completed wiped of installed data due to malicious software...
Read more...
by
Nathan Ord - Sat, Jun 12, 2021
A seven-year-old local privilege escalation bug has reared its head and finally got a fix. When it was available, exploiting the vulnerability in the polkit authentication service could have allowed attackers to get a root shell on several...
Read more...
by
Brandon Hill - Wed, May 05, 2021
Dell is one of the most popular PC brands globally, selling millions of laptops, desktops, and server systems to everyday consumers and businesses alike each year. However, SentinelLabs researchers warned this week that five critical...
Read more...
by
Nathan Ord - Sat, May 01, 2021
Back in 2018, a processor security vulnerability called Spectre appeared, affecting all modern CPU architectures from Intel, AMD, and even ARM in the last 20 years. Since then, major players and semiconductor OEMs have worked hard to patch...
Read more...
by
Nathan Ord - Thu, Apr 22, 2021
When independent or academic research is carried out, ethics is a primary concern if you have anything to do with people outside the research group. With that in mind, the University of Minnesota has seemingly been performing ethically...
Read more...
by
Nathan Ord - Tue, Apr 20, 2021
This year, there have been several cybersecurity incidents, such as the Microsoft Exchange issue, across numerous industries and government organizations. It appears that the defense industry is now being targeted by at least two...
Read more...
by
Nathan Ord - Wed, Apr 14, 2021
The Microsoft Exchange zero-day vulnerabilities seemed to cause quite a bit of havoc across several industries and organizations. Since it was first discovered, however, patches have been rolling out from Microsoft and frantic orders to...
Read more...
by
Nathan Ord - Fri, Feb 05, 2021
Earlier in the week, user PixelRick discovered a vulnerability in Cyberpunk 2077, leading to code execution on a system via malicious data files. While modders were initially blamed for the risk, it turns out that the issue stemmed from...
Read more...
by
Nathan Ord - Thu, Feb 04, 2021
Yesterday, we reported that CD Projekt Red sent out a warning that was effectively against "downloading mods", but it appears that we did not have the full story from the developers of Cyberpunk 2077. According to users on the CD Projekt...
Read more...
by
Nathan Ord - Wed, Feb 03, 2021
When it comes to using the internet in any way, a general rule of thumb is that you should never download software from a source that you do not trust. Yesterday, CD Projekt Red Support sent out a tweet to dissuade people from downloading...
Read more...
by
Nathan Ord - Sat, Jan 16, 2021
If you give some kids restricted access to technology, they are bound to find a loophole or bug that lets them do what they want regardless. After being asked by his kids to “hack” his Linux desktop, one Dad let the kids play with the...
Read more...