Browsing category

Vulnerabilities

CloudFlair: Bypassing Cloudflare using Internet-wide scan data

Cloudflare is a service that acts as a middleman between a website and its end users, protecting it from various attacks. Unfortunately, those websites are often poorly configured, allowing an attacker to entirely bypass Cloudflare and run DDoS attacks or exploit web-based vulnerabilities that would otherwise be blocked. This post demonstrates the weakness and introduces CloudFlair, […]

Critical Flaw in Popular BitTorrent Transmission Client Leads to an Attacker Perform Remote Hack into Your PC

A critical flaw discovered in BitTorrent Transmission client app that allows an attacker can remotely control the victims PC by using a method called DNS Rebinding which leads to Transmission control can remotely access by an attacker via a malicious website. Bit Torrent Transmission Client performing download an seeding operation using Client and server architecture […]

Security researchers flag invite bug in WhatsApp group chats

Security researchers have revealed details of a vulnerability in WhatsApp’s security that could be used to compromise the secrecy of encrypted group chats on the messaging platform. The risk associated with the flaw is limited on account of attackers needing to have access to WhatsApp servers to be able to insert themselves into a group […]

New Intel Security Vulnerability Discovered, Millions of Laptops Affected

The vulnerability fiasco continues for Intel with new bug. As if the Meltdown and Spectre bugs weren’t enough trouble for Intel already, security researcher Harry Sintonen working for Finnish company F-Secure discovered another vulnerability that potentially affects millions of corporate laptops. This time, the security bug exists in Intel’s Active Management Technology (AMT) and can be […]

EMC, VMware security bugs throw gasoline on cloud security fire

Backups of virtual machines on some hosts could be accessed or altered by an attacker. While everyone was screaming about Meltdown and Spectre, another urgent security fix was already in progress for many corporate data centers and cloud providers who use products from Dell’s EMC and VMware units. A trio of critical, newly reported vulnerabilities in […]

macOS High Sierra’s App Store System Can be Unlocked by Any Password

New bug discovered in macOS High Sierra allows unlocking the App Store System Preferences by any password. App Store System Preferences accept any password when system logged in with local admin Privilege. This could be very dangerous if anyone already has your system permission and they can able to download any apps, modifying the apps store […]

How to Protect Your Home Router from Attacks

A comprehensive guide for choosing and setting up secure Wi-Fi. our router, that box sitting in a corner of your house giving you internet access, is in many ways more important than your laptop or mobile phone. It might not store any of your personal information directly, but sensitive data passes through it every time […]

Zero-day vulnerabilities hijack full Dell EMC Data Protection Suite

Researchers have discovered severe vulnerabilities in the suite which can lead to full system takeover. Security researchers have discovered a set of zero-day vulnerabilities within the Dell EMC Data Protection Suite Family products which allow attackers to fully hijack systems. The Dell EMC Data Protection Suite (.PDF), a product set for enterprises to protect data and critical […]

Apple confirms iPhone, Mac affected by Meltdown-Spectre vulnerabilities

The iPhone maker has confirmed all Mac systems and devices running iOS are affected by the vulnerabilities, but also said there are currently no known exploits. Apple has issued a statement regarding the Meltdown and Spectre vulnerabilities, confirming all Mac systems and iOS devices are affected, but saying there are no known exploits impacting customers at this time. […]

Privacy of location tracking device owners threatened by ‘Trackmageddon’ flaws

A slew of online services used to manage GPS- and GSM-based location tracking devices have been found vulnerable to flaws that could allow attackers to hijack these devices and reveal their owners’ past and current locations. In an online post on Tuesday, security researchers Vangelis Stykas and Michael Gruhn detailed the vulnerabilities, collectively named Trackmageddon, in 103 […]

Google Apps Script vulnerability could have opened the door for malware

No user interaction required – and the exploit could’ve been used to distribute any form of malware. A vulnerability in Google Apps Script could have allowed attackers to use Google Drive to discreetly deliver malware to unsuspecting victims. Google Apps Script is a JavaScript based language used for the creation of add-ons and extensions for […]

Trackmageddon – Location Tracking Services (GPS) Vulnerabilities Allow to Access Unauthorized GPS Location Data

Security researchers discovered multiple vulnerabilities dubbed “Trackmageddon” which affects GPS services and online location tracking devices. The vulnerabilities with GPS location tracking devices allow an unauthorized access to the location data that collected by all of the location tracking devices. With the Trackmageddon vulnerability, attackers can get access to the location, model/type name, assigned phone […]

Web Trackers are now Exploiting Password Managers to Track User Behavior

Password Managers have been around for quite some time, and most of us rely on them for managing our passwords across several websites. Services like LastPass, 1Pass, and KeePass have been pretty popular with the users. Apart from saving your credentials, the Password managers also help users by generating strong passwords. The Password managers have […]

PROCESS DOPPELGÄNGING – GIVING HARD TIME TO AV VENDORS

Recently security researcher’s from enSilo group presented new evasion technique called Process Doppelgänging at Blackhat Europe-2017. This technique bypasses most popular Antivirus, NGFW and EDR solutions present in the market. This technique works on all windows starting Vista till Windows Server 2016.   Process Doppelgänging makes malware capable to execute malicious code under radar of genuine executable […]