Microsoft warned of a critical vulnerability in Cosmos DB
Microsoft has warned thousands of Azure customers of a critical Cosmos DB vulnerability. The bug allows any user remote database management, and grants administrator rights without the need for authorization.…
LockFile ransomware adopts ProxyShell and PetitPotam vulnerabilities
The new LockFile ransomware exploits recently discovered ProxyShell and PetitPotam vulnerabilities to increase its chances of hacking and encrypting corporate networks. Experts from TG Soft and well-known information security researcher…
Over 2000 Exchange Servers Hacked Using ProxyShell Exploit
Researchers at Huntress Labs estimate that over the past few days, about 2,000 Microsoft Exchange mail servers have been compromised and infected with backdoors, because their owners have not installed…
Experts list 15 most attacked Linux vulnerabilities
Trend Micro has published a list of the top threats and most attacked vulnerabilities for Linux in the first half of 2021. The results were obtained from honeypots, sensors and…
Due to Razer Synapse vulnerability, connecting a mouse to a Windows machine gives system privileges
A security researcher known as jonhat discovered a 0-day vulnerability in Razer Synapse, thanks to which user can gain Windows administrator rights by simply connecting a Razer mouse or keyboard…
Attackers hacked the US Census Bureau using Citrix exploit
The Office of the Inspector General (OIG) reported that unknown attackers hacked the servers of the US Census Bureau on January 11, 2020. To do this, a zero-day Citrix ADC…
Vulnerabilities in STARTTLS threaten popular email clients
At the USENIX conference, a group of German scientists announced the discovery of more than 40 vulnerabilities in STARTTLS implementations in popular mail clients and servers, including Apple Mail, Gmail,…
List of suspects in terrorism that are monitored by the FBI leaked to the network
A copy of the FBI's Terrorist Screening Center (TSC) list has Leaked to the network. It is a list of suspects in terrorism that are monitored by FBI. The database…
Hackers exploit ProxyShell vulnerabilities to install backdoors
Experts warn that hackers are attacking Microsoft Exchange servers, exploiting ProxyShell vulnerabilities, and installing backdoors on them for subsequent access. Let me remind you that the vulnerabilities, which are collectively…
Microsoft Warns of New Print Spooler Vulnerability
Microsoft has released a notice of a new vulnerability in Print Spooler (CVE-2021-36958) that allows local attackers to gain system privileges on a computer. The new vulnerability is related to…
Microsoft releases patches for 44 vulnerabilities, including three 0-days
As part of Patch Tuesday this week, Microsoft released patches for 44 vulnerabilities (51 including bugs in Microsoft Edge), seven of which were classified as critical, three were 0-day, and…
FlyTrap Android malware compromised over 10,000 Facebook accounts
According to experts from Zimperium, Android malware FlyTrap hijacks Facebook accounts in 140 countries around the world by stealing session cookies. Worse, the researchers found that the stolen information was…
