Browsing category

Vulnerabilities

Epic Fail: TP-Link 3G Router Spews Admin Password via SMS

A particular TP-Link router model will spew out its admin password in cleatext to anyone that sends an SMS message to the router’s SIM card with a particular script inside, according to German security researcher Jan Hörsch, who shared his findings with German newspaper Heise.de. The vulnerability affects TP-Link model M5350, a 3G mobile Wi-Fi […]

Critical Office Zero-Day Attacks Detected in the Wild

At McAfee, we have put significant efforts in hunting attacks such as advanced persistent threats and “zero days.” Yesterday, we observed suspicious activities from some samples. After quick but in-depth research, this morning we have confirmed these samples are exploiting a vulnerability in Microsoft Windows and Office that is not yet patched. This blog post […]

New Zero Day Attack Discovered in MS Word Document Uses to Hack your PC – Still Not yet Patched

[jpshare] MS word Document is on of the main Vector to easily spread the Macro viruses to the Victims. an undisclosed vulnerability has been Discovered in  Microsoft Office RTF( Rich Text Format) Document. FireEye Security Researchers Said, This vulnerability allows a malicious actor to execute a Visual Basic script when the user opens a document containing an embedded exploit.This vulnerability found […]

Australian Dark Web Hacking Campaign Unmasked Hundreds Globally

The investigation into The Love Zone child pornography site was much larger in scope than previously thought. Last year, Motherboard found Australian authorities had unmasked Tor users in the US as part of a child pornography investigation. Judging by court documents, Australian authorities sent targets a hyperlink to a video that, when clicked, would give […]

Ransomware Gang Made Over $100,000 by Exploiting Apache Struts Zero-Day

For more than a month, at least ten groups of attackers have been compromising systems running applications built with Apache Struts and installing backdoors, DDoS bots, cryptocurrency miners, or ransomware, depending if the machine is running Linux or Windows. For their attacks, the groups are using a zero-day in Apache Struts, disclosed and immediately fixed […]

Linux-based Tizen OS Is Easily Hackable — Samsung’s Open Source Android Replacement

Short Bytes: There are good chances that you might’ve heard about Samsung’s Android replacement Tizen OS. Recently, an Israeli researcher uncovered 40 zero-days in this Linux-based open source OS. As most of the flaws can enable remote code execution, they are very critical. While Samsung refused to acknowledge the findings initially, it has recently promised to mitigate […]

Hackers Empty ATMs by Drilling One Small Hole

Hackers are using a combination of low and high-tech attacks to make ATMS spit out cash, according to Kaspersky researcher Igor Soumenkov, who presented this novel attack at this year’s Security Analyst Summit, taking place in St. Maarten this week. These attacks first started last year, when several banks in Europe and Russia discovered empty […]

UEFI Vulnerabilities allow to fully compromise Gigabyte Mini PCs

Experts at Cylance disclosed two UEFI flaws that can be exploited by attackers to install a backdoor on some Gigabyte BRIX mini PCs. Experts at security firm Cylance have disclosed two UEFI vulnerabilities that can be exploited by attackers to install a backdoor on some Gigabyte BRIX mini PCs. The experts tested the latest firmware […]

Phishing campaigns target airline consumers seeking business credentials

A series of phishing campaigns is targeting airline consumers with messages crafted to trick victims into handing over personal or business credentials. A wave string of phishing campaigns is targeting airline consumers with messages crafted to trick victims into handing over personal or business credentials. The phishing messages pretend to be sent from a travel agency […]

Skype users hit by ransomware through in-app malicious ads

Several users have complained about “fake Flash” ads, which if triggered, can lead to a ransomware attack. Several users have complained that ads served through Microsoft’s Skype app are serving malicious downloads, which if opened, can trigger ransomware. News of the issue came from a Reddit thread on Wednesday, in which the original poster said […]

Researchers Disclose Vulnerabilities in GIGABYTE BRIX Systems

Earlier this month, we teased a proof of concept for UEFI ransomware, which was presented at RSA Conference 2017. The HackingTeam, Snowden, Shadow Brokers, and Vault7 leaks have revealed that UEFI/BIOS implants aren’t just a theoretical concept, but have actually been weaponized by nation states to conduct cyber-espionage. Physical access requirements are a thing of […]

Kremlin-backed APT28 doesn’t even bother hiding its attacks, says Finnish secret police

Supo: Espionage rising, attacks on infrastructure falling. The Finnish Security Intelligence Service Supo is complaining that nation-state-level attackers aren’t even bothering to hide themselves from prying eyes. That news comes in the agency’s review of intelligence activity in 2016, announced here. The major trends in cyber-intelligence Supo highlights in the report are increasing attacks against […]

Google Wants to Change JavaScript Popups After Abuse from Tech Support Scammers

Chromium engineers are discussing plans to change how JavaScript popups work inside Chrome and other similar browsers. In a proposal published on the Google Developers portal, the Chromium team acknowledged that JavaScript popups are consistently used to harm users. While JavaScript popups have been used to redirect users to malware downloads, these intrusive dialogs have […]

Around 8 million websites affected by a critical Buffer Overflow Vulnerability resides in IIS 6.0

Internet Information Services is an extensible web server made by Microsoft for use with the Windows NT family.IIS can help you achieve better performance, reliability, scalability, and security for your websites. The IIS6.0 zero-day flaw was found by two scientists with the Information Security Lab and School of Computer Science and Engineering, South China University of […]