Browsing tag

vulnerability

Vulnerability in Amadeus systems exposes travel records of millions of people

This error could have allowed hackers to modify multiple travel details Ethical hacking and network security specialists from the International Institute of Cyber Security report that due to a recently discovered vulnerability in the Amadeus reservation system, an attacker or attackers were able to access and change the reservations using only a reservation number.   The […]

36-year-old vulnerabilities in SCP

These flaws could lead to remote code execution on compromised systems According to experts in network security and ethical hacking from the International Institute of Cyber Security, a set of 36-year-old vulnerabilities in the implementation of the Secure Copy Protocol (SCP) of multiple client applications has been discovered; vulnerabilities could be exploited by malicious users […]

Hotel group launches its own vulnerability bounty program

Hyatt Hotels will begin collaboration with external experts to avoid incidents that may affect its customers’ personal data Network security and ethical hacking specialists from the International Institute of Cyber Security reported that Hyatt Hotels has announced the implementation of its own vulnerability bounty program, after suffering a payment card information theft incident. The company […]

New Phishing Attack Taking Advantages of Vulnerability in Office 365 to Bypass all of Microsoft’s Security

Researchers discovered a new type of advance phishing attack that taking advantages of office 365 vulnerability to bypass all the Microsoft security even though users implemented the Advanced Threat Protection (APT) Phishing attacks one of the most frequently targeting millions of users nowadays and this attack left all the Office 365 users vulnerable since the […]

Recently found critical vulnerabilities in SAP system

The company is preparing 11 patches to correct these flaws Last Tuesday the SAP business provider launched 11 different security alerts for its users. According to cybersecurity and ethical hacking specialists from the International Institute of Cyber Security, the company informed its customers about the launch of a series of security patches to correct vulnerabilities […]

The Contents Of The Microsoft January 2019 Patch Tuesday

As the 2019 Windows update season starts, we are set to witness the last full year of Windows 7 support, while Windows 8.x and 10 will continue to receive updates beyond  Windows 7’s discontinuation next year. The first Patch Tuesday of 2019 is very eventful, with the huge January 8 update packing 47 hotfixes, mostly […]

Nasty Side-Channel Attack Vulnerability (Again) In Windows & Linux Discovered

A new variant of side-channel attack is recently discovered being actively exploited in the wild against Windows and Linux targets. Publicly revealed in a paper titled ‘Page Cache Attacks’ published by a group of researchers headed by Daniel Gruss, Erik Kraft, Trishita Tiwari, Michael Schwarz and other members from Graz University of Technology and Boston […]

Thousands of Internet connected hot tubs vulnerable to remote attacks

Weak security practices have rendered IoT devices vulnerable to hacking and all sorts of cyber-attacks. According to the research from a Buckinghamshire-based security group Pen Test Partners, hot tubs can also be hacked using an app simply because there isn’t any authentication process in place. Reportedly, 26,000 hot tubs are currently vulnerable to be hacked […]

Researchers Found Goldluck Malware Infecting iPhone Apps

The Goldluck malware has been around for more than a year. The malware basically gave hackers privileges which allowed them to send premium messages and earn money. Historically, Goldluck has been associated with popular classic game apps on Android. Today, security researchers revealed that “more than a dozen iPhone apps covertly communicating with a server […]

Google fixes critical vulnerability in Chrome for Android after 3 years

A three-year-old security vulnerability in Google Chrome for Android has finally been fixed by Google. It is quite surprising that the tech giant took so long to fix a flaw that was identified several years back. The flaw was originally identified at Nightwatch Cybersecurity by white hat hackers in May 2015. It is only now […]

Open source software vulnerability bounty program

This program will focus on the 14 open source products used by the organization According to cybersecurity and ethical hacking specialists from the International Institute of Cyber Security, the European Union will launch a vulnerability bounty program for the 14 open source products that the organization uses. Julia Reda, Member of the European Parliament, recently […]

Zero-day vulnerability in Windows allows overwriting any file

This is the fourth zero-day vulnerability in Windows revealed in December 2018 A cybersecurity researcher has revealed the code to exploit critical zero-day vulnerability present in the Windows operating system, the fourth security error of this class presented during the last month of 2018. According to specialists from the International Institute of Cyber Security, this […]

Almost 19,500 Orange Modems Leaking WiFi Credentials

This is becoming a real headache for customers of Orange Livebox ADSL modem in France and Spain during the Christmas season; almost 19,500 modems have been discovered leaking WiFi credentials. This discovery has been made by a security researcher during the last weekend. ZDNet reports, “Over the weekend, a security researcher has discovered that nearly […]

Zero-day vulnerability in Microsoft Internet Explorer; update your system now

A new remote code execution flaw affects the Microsoft browser Cybersecurity experts from the International Institute of Cyber Security report that Microsoft has just launched an urgent security update to correct critical zero-day vulnerability in the Internet Explorer browser. According to reports, there is evidence that some malicious hackers have been exploiting this vulnerability in the […]

Critical vulnerability in SQLite; you should update now

This software is used by thousands of organizations in the world Digital forensics specialists from the International Cyber Security Institute report the discovery of a critical vulnerability in the SQLite software, a widely used database engine; according to reports, the vulnerability could expose millions of implementations to multiple cyberattacks. The SQLite vulnerability, nicknamed “Magellan” by […]

GitLab offers “exclusive rewards” in its vulnerability bounty program

The website announces that its rewards program is open to the participation of the general public The GitLab developing team reports that its bug bounty program has been kept active throughout the 2018, paying about $200k USD and helping to solve about 200 vulnerabilities. According to experts in digital forensics from the International Institute of […]

126 vulnerabilities patched in Microsoft and Adobe this December 2018

Multiple update patches are coming Sysadmins will work overtime over the next holidays. According to digital forensics specialists from the International Institute of Cyber Security, the next update patch set to be launched by Microsoft includes fixes for nine critical vulnerabilities, including the repair of zero-day vulnerability. In addition to the 39 errors reported by […]

Critical vulnerabilities in phpMyAdmin

  Admins of thousands of websites are waiting for the update launching According to reports of specialists in digital forensics from the International Institute of Cyber Security, the administrators of phpMyAdmin, one of the most popular and widely used MySQL database management systems, have just launched an updated version of its software with the purpose […]

Toyota’s PASTA- A car hacking tool to enhance automobile cybersecurity

A team of security researchers working for the renowned automobile maker Toyota have developed a new car hacking tool. Dubbed as PASTA (Portable Automotive Security Testbed with Adaptability), it is an open source tool created to help researchers identify the prevailing vulnerabilities in modern vehicles. The team presented their research at the BLACKHAT EUROPE 2018, […]

Spying on 3G – 5G users with just a $1.5k USD investment

An investigation shows that AKA protocol is still vulnerable A communications protocol, originally intended to protect the privacy of mobile phone users, is vulnerable to fake base station attacks, as evidenced by an investigation carried out by a team of digital forensics and cybersecurity experts. Apparently all the experts needed to perform the attack were […]