Securing accounts and personal information through single-factor authentication is now on the United States Cybersecurity and Infrastructure Security Agency' (CISA) list of bad practices.
Read: https://thehackernews.com/2021/08/cisa-adds-single-factor-authentication.html
Read: https://thehackernews.com/2021/08/cisa-adds-single-factor-authentication.html
Newly discovered vulnerabilities in Fortress S03 Wi-Fi home security alarm system could allow malicious parties to remotely gain unauthorized access and alter system behavior, including disarming devices without the victim's knowledge.
Details: https://thehackernews.com/2021/08/attackers-can-remotely-disable-fortress.html
Details: https://thehackernews.com/2021/08/attackers-can-remotely-disable-fortress.html
Researchers have developed a machine learning technique that relies on authentic interactions between Bluetooth devices to build a reliable technique for securing device-to-device authentication.
Read: https://thehackernews.com/2021/08/researchers-propose-machine-learning.html
Read: https://thehackernews.com/2021/08/researchers-propose-machine-learning.html
QNAP is currently investigating two newly discovered security vulnerabilities in OpenSSL to determine their impact on its network-attached storage (NAS) appliances and says it will release security updates as needed.
Details: https://thehackernews.com/2021/09/qnap-working-on-patches-for-openssl.html
Details: https://thehackernews.com/2021/09/qnap-working-on-patches-for-openssl.html
Linphone's Session Initiation Protocol (SIP) stack has a vulnerability that can be remotely exploited without the victim's knowledge to crash the SIP client's device.
Read: https://thehackernews.com/2021/09/linphone-sip-stack-bug-could-let.html
Read: https://thehackernews.com/2021/09/linphone-sip-stack-bug-could-let.html
As the popularity of internet-sharing or "proxyware" platforms such as Honeygain and Nanowire grows, cybercriminals are using these platforms as a channel to monetize their malware activities.
Read details: https://thehackernews.com/2021/09/cybercriminals-abusing-internet-sharing.html
Read details: https://thehackernews.com/2021/09/cybercriminals-abusing-internet-sharing.html
FTC has banned stalkerware app SpyFone from the surveillance business over concerns that it stole and shared sensitive data on people's physical movements and online activities that stalkers used to monitor potential targets.
Read: https://thehackernews.com/2021/09/ftc-bans-stalkerware-app-spyfone-orders.html
Read: https://thehackernews.com/2021/09/ftc-bans-stalkerware-app-spyfone-orders.html
Chinese law enforcement authorities have arrested cybercriminals behind the Mozi IoT botnet, nearly two years after the malware first appeared on the threat landscape.
Read details: https://thehackernews.com/2021/09/chinese-authorities-arrest-hackers.html
Read details: https://thehackernews.com/2021/09/chinese-authorities-arrest-hackers.html
A high-severity security vulnerability in WhatsApp's image filtering feature could have been exploited to remotely read sensitive information from victims' devices by simply sending them a malicious image through the messaging app.
Details: https://thehackernews.com/2021/09/whatsapp-photo-filter-bug-could-have.html
Details: https://thehackernews.com/2021/09/whatsapp-photo-filter-bug-could-have.html
Newly discovered flaws in commercial Bluetooth stacks affect millions of smartphones, laptops and industrial and consumer IoT devices.
Read: https://thehackernews.com/2021/09/new-braktooth-flaws-leave-millions-of.html
Dubbed "BrakTooth," it could allow attackers to run arbitrary code on the device or, worse, crash it.
Read: https://thehackernews.com/2021/09/new-braktooth-flaws-leave-millions-of.html
Dubbed "BrakTooth," it could allow attackers to run arbitrary code on the device or, worse, crash it.
Cisco has released a patch for a critical vulnerability in its Enterprise NFVIS software, which could be exploited by an attacker to take control of affected systems.
Read: https://thehackernews.com/2021/09/cisco-issues-patch-for-critical.html
A proof-of-concept (PoC) exploit is available publicly.
Read: https://thehackernews.com/2021/09/cisco-issues-patch-for-critical.html
A proof-of-concept (PoC) exploit is available publicly.
FIN7 hackers are using Windows 11-themed Word documents to drop malicious payloads, including a JavaScript backdoor.
https://thehackernews.com/2021/09/fin7-hackers-using-windows-11-themed.html
The attack targeted a US-based point-of-sale (PoS) service provider as part of spear-phishing campaigns.
https://thehackernews.com/2021/09/fin7-hackers-using-windows-11-themed.html
The attack targeted a US-based point-of-sale (PoS) service provider as part of spear-phishing campaigns.
New malware family — PRIVATELOG, and its installer, STASHLOG — relies on the Common Log File System (CLFS) to hide a second stage payload in registry transaction files and avoid detection.
Read more: https://thehackernews.com/2021/09/this-new-malware-family-using-clfs-log.html
Read more: https://thehackernews.com/2021/09/this-new-malware-family-using-clfs-log.html
U.S. Cyber Command warns of ongoing attacks exploiting a recently disclosed vulnerability (CVE-2021-26084) in #Atlassian Confluence that could be exploited by unauthenticated attackers to take control of vulnerable systems.
Details: https://thehackernews.com/2021/09/us-cyber-command-warns-of-ongoing.html
Details: https://thehackernews.com/2021/09/us-cyber-command-warns-of-ongoing.html
Microsoft shares technical details of an actively exploited vulnerability affecting SolarWinds Serv-U FTP server software that it attributes to hackers from China.
Read details: https://thehackernews.com/2021/09/microsoft-says-chinese-hackers-were.html
Read details: https://thehackernews.com/2021/09/microsoft-says-chinese-hackers-were.html
Apple is temporarily delaying its controversial plans to scan users' devices for child sexual abuse material after receiving blowback over fears that the tool could be used as a weapon for mass surveillance and erode users' privacy.
Read: https://thehackernews.com/2021/09/apple-delays-plans-to-scan-devices-for.html
Read: https://thehackernews.com/2021/09/apple-delays-plans-to-scan-devices-for.html
One of the 3 newly discovered vulnerabilities in NETGEAR Smart Switches, an attacker could bypass authentication and gain complete control of the affected device.
Patch and PoC released - https://thehackernews.com/2021/09/critical-auth-bypass-bug-affect-netgear.html
Patch and PoC released - https://thehackernews.com/2021/09/critical-auth-bypass-bug-affect-netgear.html
As part of an ongoing campaign, cybercriminals are using traffic exchange networks as a broad and fast way to distribute malware (click fraud bots, information stealers, ransomware) disguised as cracked versions of popular applications.
Read: https://thehackernews.com/2021/09/traffic-exchange-networks-distributing.html
Read: https://thehackernews.com/2021/09/traffic-exchange-networks-distributing.html
Despite "no log" policy, ProtonMail shares an activist's IP address and device type with law enforcement agencies.
https://thehackernews.com/2021/09/protonmail-shares-activists-ip-address.html
If Swiss authorities agree to assist foreign agencies, the company has to comply, and it could even be forced to hand over data.
https://thehackernews.com/2021/09/protonmail-shares-activists-ip-address.html
If Swiss authorities agree to assist foreign agencies, the company has to comply, and it could even be forced to hand over data.
Hackers exploited a recently disclosed vulnerability in Atlassian's Confluence to break into a Jenkins project infrastructure server.
https://thehackernews.com/2021/09/latest-atlassian-confluence-flaw.html
"At this time we have no reason to believe that any Jenkins releases, plugins, or source code have been affected"
https://thehackernews.com/2021/09/latest-atlassian-confluence-flaw.html
"At this time we have no reason to believe that any Jenkins releases, plugins, or source code have been affected"
Microsoft has issued an advisory WARNING its users about a new actively exploited ZERO-DAY vulnerability (CVE-2021-40444 // CVSS score: 8.8) that attackers are using to hijack Windows systems by leveraging weaponized Office documents.
Details: https://thehackernews.com/2021/09/new-0-day-attack-targeting-windows.html
Details: https://thehackernews.com/2021/09/new-0-day-attack-targeting-windows.html
👍1