Browsing category

Vulnerabilities

Swann’s home security camera recordings could be intervened

This camera can be purchased in both large commercial chains and online stores According to reports from experts in enterprise data protection services, a popular wireless security camera designed to monitor businesses and households is vulnerable to espionage attacks. Thanks to this failure it was possible to hijack video and audio transmitted from the properties of […]

Security flaw that allows hackers to replace serverless codes at IBM is fixed

This is the first vulnerability in a serverless platform being publicly disclosed International Business Machines Corporation (IBM) researchers have solved a critical vulnerability present in their cloud functions which, if exploited, would allow malicious hackers to remotely replace the serverless code of the company and install its own code development, as reported by enterprise data protection services experts […]

Targeted Incentive Program: A new bug bounty program 1 Million USD

For the last 13 years, Zero Day Initiative (ZDI) has purchased lots of bug reports for their publication. According to reports of enterprise data protection services experts, only in the first half of this year, ZDI has published 600 reports, and the number keeps increasing. An advantage of buying so many bug reports is that researchers can […]

New variants of the Spectre vulnerability

The issue has shot alert even in the U.S. Congress CPU manufacturers face two new variations of Specter’s lateral channel attack vulnerabilities, following a series of investigations by experts in enterprise data protection services. Like its predecessors, these last two vulnerabilities arise during the speculative execution process, with the difference that none of them resolves with recently […]

CISCO fixes serious bug on VoIP Phones

The company also patched three medium-security flaws in its network security systems Several customers may be affected by a high-security flaw discovered on Cisco’s Voice over Internet Protocol (VoIP) services. The manufacturer released an update patch last Wednesday. Cisco also fixed two medium-security flaws on its FireSIGHT management platform for network security, and a medium-security problem in […]

Samsung Galaxy devices send private images attached to text messages

The company requests the concerned users to contact them directly. Users report that a bug present in several models of Samsung smartphones makes their photos being sent by message to their stored contacts. The problem is affecting the most recent models, including the Samsung Galaxy Note 8 and the Galaxy S9, and the problem seems to find […]

LTE and 5G networks could be affected by new vulnerabilities

A group of pentest researchers has demonstrated ability to passively identify session details and perform hijacking, allowing phishing attacks. According to the International Institute of Cyber Security, researchers have found vulnerabilities in LTE standards, which leave users vulnerable to possible attacks, such as determining user identities, determining which websites accessed a particular user and modify DNS traffic, […]

Zerodium pays up to $500 000 for zero-day exploits

The sale of zero-day exploits is a very profitable business that most people completely ignore. The International Institute of Cyber Security talks about this practice using the example of Zerodium, a zero-day broker. According to the company itself, Zerodium offers rewards to information security and pentest investigators to acquire its original zero-day vulnerability investigations that affect major operating systems, […]

Patching DoublePulsar to Exploit Windows Embedded Machines

During one of my engagements, I discovered some Windows devices that were affected by the MS17-010vulnerability. One of these devices caught my attention as it’s something I haven’t encountered yet – a Windows Embedded operating system.  Since it’s vulnerable to MS17-010, I immediately tried the relevant Metasploit modules. However, none of them worked. All I got was just […]

Exploited vulnerability in Cisco ASA and Firepower devices

A severe vulnerability affecting CISCO ASA and Firepower devices is being exploited after an exploit was released online, as revealed by late pentest. According to reports from the company itself and the International Institute of Cyber Security, the Cisco security team is aware of a public proof-of-concept exploit and has alerted its users about the […]

Attacking Private Networks from the Internet with DNS Rebinding

TL;DR Following the wrong link could allow remote attackers to control your WiFi router, Google Home, Roku, Sonos speakers, home thermostats and more. The home WiFi network is a sacred place; your own local neighborhood of cyberspace. There we connect our phones, laptops, and “smart” devices to each other and to the Internet and in turn […]

Cisco launches 34 update patches for different vulnerabilities, 5 of them critical

Cisco, a company dedicated to manufacturing telecommunications devices, launched patches for 34 failures in its software, including solutions for five critical vulnerabilities of arbitrary code execution in its operating system. Reports from information security specialists argue that critical flaws were rated with 9.8 out of 10 on the CVSS scale. Four of these vulnerabilities affect Cisco’s […]

Cisco Released Patches for More than 30 Vulnerabilities Including the 5 Critical One’s in FXOS and NX-OS

Cisco released patches for 34 vulnerabilities affecting multiple products that include 5 critical vulnerabilities, 20 High severity vulnerabilities and 9 medium level vulnerabilities. Critical Vulnerabilities Cisco patched 5 critical Vulnerabilities in FXOS and NX-OS Software that allows attackers to execute a remote arbitrary code that causing a buffer overflow, denial of service (DoS), to read […]

Bug in Google Chromecast and Home devices would reveal location of users

Information technology and information security training experts have found a strange and maybe dangerous flaw in the privacy of these devices that could filter their location to potential attackers. In simple terms, this failure would allow web sites to gather the exact geographical location of users of these devices, executing a malicious script. Google, on […]

Zip Slip vulnerability affects thousands of projects

  An arbitrary file-overwrite vulnerability affects a large number of projects, researchers reveal. The flaw, known as Zip Slip by information security training experts that have analyzed it, has already been seen in the past, but never on a scale as large as now. Zip Slip is some kind of transversal directory that can be used by […]

Exploit kits: Spring 2018 review

Since our last report on exploit kits, there have been some new developments with the wider adoption of the February Flash zero-day, as well as the inclusion of a new exploit for Internet Explorer. We have not seen that many changes in the drive-by landscape for a long time, although these are the results of improvements closely tied to […]

Vulnerability in GnuPG has allowed counterfeiting of digital signatures for decades

A failure affecting GnuPG has made some of the most commonly used e-mail encryption programs vulnerable to digital signature falsification. The list of affected programs includes Enigmail and GPGTools. About Vulnerability (CVE-2018-12020) The vulnerability CVE-2018-12020, nicknamed SigSpoof by Marcus Brinkmann, the investigator who found it, emerged from “weak design choices.” According to the information security […]

Smart padlocks can be hacked in seconds

A cutting edge technology padlock, operating with fingerprint, can be opened by anyone who has a smartphone, as discovered by information security investigators. On its website, Tapplock is presented as the “first intelligent fingerprint lock in the world”. But researchers with information security training claim to have taken only 45 minutes to find a way […]

Hackers can use Cortana to break into computers with Windows 10

Cortana has security vulnerabilities when it operates on the lock screen Microsoft has launched a security update to prevent hackers from entering PC via Cortana, the digital assistant integrated into each version of Windows 10. Researchers with information security training found that Cortana could be activated from a lock screen in order to index files […]