Any Wi-Fi enabled devices are vulnerable to Frag Attacks issues
The well-known information security expert Mathy Vanhoef reported the discovery of a whole set of vulnerabilities named Frag Attacks (Fragmentation and aggregation attacks), which affect all devices with Wi-Fi support,…
FBI investigates cyberattacks on two water supply systems in Pennsylvania
Last month, the local Water Action Response Network, which includes utility companies, sent emails to its members, informing that cyberattacks had affected two water supply systems. According to the letter,…
Qualcomm Mobile Station Modem vulnerability threatens 40% of smartphones
More than a third of all smartphones in the world have been affected by a new vulnerability in Qualcomm Mobile Station Modem (MSM). This bug gives attackers access to call…
Chrome 90 gets new security feature to protect against attacks on Windows 10
Google has introduced a new Windows 10 security feature called Hardware-enforced Stack Protection in its Chrome 90 browser to protect the memory stack against cyberattacks. Microsoft introduced Hardware-enforced Stack Protection…
Microsoft will permanently remove Adobe Flash Player from Windows in summer 2021
According to manufacturers’ elaborate plan, since beginning of 2021 support for Adobe Flash Player was finally discontinued. This means that Adobe has officially stopped distributing Flash Player and its updates,…
New Micro-op Cache Attack Bypasses Specter Protection
A team of researchers from the Universities of Virginia and California has developed a new attack on hardware that bypasses Specter protection. The attack allows stealing data when the processor…
GitHub Developers Review Exploit Posting Policy Due to Recent Scandal
The GitHub developers review the exploit posting policy and want to discuss with the information security community a series of changes to the site rules. These rules determine how employees…
Attackers Hacked OGUsers Hacking Forum Again
Recently, the media reported that attackers hacked one of the most popular hacking forums on the Internet, OGUSERS (aka OGU) again, for the second time in the last year. Then…
Google fixed another major vulnerability in the V8 engine
A series of feverish fixes for problems in Google Chrome continues, this time Google has fixed a major vulnerability related to the operation of the JavaScript engine V8 in the…
Criminals threaten to leak new Apple logo, if the company doesn’t pay the ransom
Last week it became known that the operators of the ransomware REvil are trying to blackmail Apple, and now the criminals threaten to leak the company's new logo into the…
Researchers made Tesla’s autopilot work without a driver
Tesla's autopilot system can be easily tricked into driving a car without a driver. According to experts from the non-profit organization Consumer Reports, the investigation of this problem appeared after…
Prometei botnet attacks vulnerable Microsoft Exchange servers
Since the patches for ProxyLogon problems were still not installed, cybercriminals continue their activity, for example, the updated Prometei botnet attacks vulnerable Microsoft Exchange servers. Researchers from Cybereason Nocturnus discovered…