Home Blog

Microsoft has warned about a new 0-day vulnerability in Internet Explorer, a patch for which is not yet

Microsoft has reported a zero-day vulnerability in Internet Explorer, which is already being exploited for "limited targeted attacks." The problem received the identifier CVE-2020-0674 and is associated with a vulnerability in the Firefox browser, which became known in early January. Apparently, the mentioned "limited attacks" are part of a larger hacker campaign, which also included attacks on users of Firefox. Qihoo 360 experts...

Vulnerabilities in WordPress Database Reset plugin allow to capture or erase a site database

Wordfence specialists report that at the beginning of January, dangerous vulnerabilities were discovered in the popular WordPress Database Reset plugin installed on more than 80,000 sites. This plugin, developed by WebFactory Ltd, is designed to invest in database setup and quick reset to default settings. As a result, bugs can be used to capture sites and reset tables in the database. The first...

NSA discovered a dangerous cryptographic vulnerability in Windows

The US National Security Agency (NSA) discovered a serious cryptographic bug CVE-2020-0601 , which is dangerous for Windows 10, Windows Server 2019 and Windows Server 2016. The vulnerability is related to the operation of Windows CryptoAPI, the main component of Windows that is responsible for cryptographic operations. So, NSA researchers found that there is a spoofing opportunity related to how Windows CryptoAPI...

Ryuk ransomware uses Wake-on-LAN to wake devices before attack

Edition BleepingComputer reports that known extortionist Ryuk now uses the Wake-on-LAN function to include the device in the compromised network and ensure more successful encryption. According to a recent Ryuk analysis by SentinelLabs head Vitali Kremez, when malware runs, it spawns subprocesses with argument 8 LAN. Thus, Ryuk scans the device’s ARP table, which is a list of known IP addresses on the network...

Millions of Cable Modems with Broadcom Chips Vulnerable to Cable Haunt

Danish researchers have published a report on the Cable Haunt vulnerability that threatens cable modems that use Broadcom chips. According to experts, the problem jeopardizes more than 200 million cable modems in Europe alone. Moreover, it is impossible to determine the exact number of vulnerable devices, because the vulnerability is found in the reference software, which is most likely copied by many cable modem manufacturers. The vulnerability...

Google Play Protect Protection Reveals About 1700 Applications Infected With Joker Malware

According to the published Google's report, since 2017 to the present time, experts have found a total of about 1700 applications infected with malware Joker (aka Bread). At least one such family of malware was noticed by CSIS Security Group specialists and entered Google Play: 24 malicious applications were downloaded more than 472,000 times in September 2019. Google experts say that at different...

PayPal fixed a vulnerability that helped to find out the user’s email and password

Information security specialist Alex Birsan received $ 15,300 in bug bounty, discovering a critical vulnerability in the PayPal authentication process. The expert explains that the vulnerability was related to the way PayPal stores CSRF tokens and session IDs in a JavaScript file, which made them accessible to attackers through XSSI attacks. Although an obfuscator was used for each name request to randomize names,...

Firefox fixes zero-day vulnerability

This week, Mozilla developers released updated versions of Firefox (72.0.1 and ESR 68.4.1), which fixed a vulnerability already actively used by hackers. The bug, which received the identifier CVE-2019-17026, was discovered by experts of the Chinese company Qihoo 360, and it was related to the work of IonMonkey - the JavaScript JIT compiler SpiderMonkey, the main component of the Firefox kernel responsible...

NEWS On Google Play, they immediately found three applications related to the hack band Sidewinder

Trend Micro specialists found in the official Android app store three applications at once (Camero, FileCrypt Manager and callCam) associated with the Sidewinder group specializing in cyber spyware attacks. According to experts, these applications have used the critical vulnerability CVE-2019-2215 at least since March 2019. That is, seven months before this problem was first discovered by information security specialists. Let me remind you that this...

Researchers Demonstrate How To Hack TikTok Using SMS

Check Point researchers have discovered many problems in one of the world's most popular applications, TikTok. So, knowing the victim’s phone number, attackers could manipulate other people's accounts and gain access to personal data. In fact, combining several vulnerabilities allowed remote execution of malicious code and undesirable actions on behalf of the victims and without their consent. Individually, all detected vulnerabilities had a low...

Latest news