Published exploit for Kr00k Wi-Fi vulnerability
In February 2020, information security specialists spoke at the RSA 2020 conference about the new Kr00k vulnerability (CVE-2019-15126), which can be used to intercept and decrypt Wi-Fi traffic (WPA2). Now…
Cybercriminals fake letters from WHO to distribute HawkEye and trick money into fight with COVID-19
Specialists from IBM X-Force discovered a new malicious campaign, in which cybercriminals fake letters from WHO, impersonate its CEOs Tedros Adan Gebreisus, and send users emails containing a HawkEye keylogger.…
Firefox Refuses to Support FTP Protocol
ZDNet reports that Mozilla developers consider FTP to be an insecure protocol and will soon refuse to support it in Firefox. Therefore, users will no longer be able to upload…
Ransomware attacks most often occur at night and on weekends
According to a report published by the American company FireEye, 76% of all ransomware attacks in the corporate sector occur in the off-hours: 49% of them are recorded at night…
Snoop attack steals data from Intel processors
Amazon Web Services (AWS) software engineer Pawel Wieczorkiewicz discovered another vulnerability in Intel processors that allows stealing data from the internal memory of the CPU. Discovered by Wieczorkiewicz attack was…
Microsoft stopped RDCMan development due to a bug
Microsoft has stopped development of the Remote Desktop Connection Manager (RDCMan) application after it has been identified as vulnerability. As the name suggests, this application allows remotely connecting to other…
Two new malware can steal cookies from Android apps
IS experts discovered two new malware for Android (recognized as the most vulnerable OS over the past year), called Cookiethief and Youzicheng. They are can steal cookies stored in browsers…
Modern RAM is still vulnerable to Rowhammer attacks
Recently, I wrote all about the vulnerabilities of Intel and AMD processors, and in the meantime, a group of researchers from universities in the Netherlands and Switzerland published a report…
Intel processors need hardware fixes due to new LVI attack
Security experts discovered a new attack on Intel processors called Load Value Injection (LVI). This claim is not an attempt to to balance yesterday's news about vulnerabilities in the processors…
Information security experts said that AMD processors are vulnerable to two attacks
A joint group of specialists from the National Center for Scientific Research of France and the Graz Technical University published a report on new attack vectors for AMD processors. Researchers…
More than 40% of Android users are at risk of cyberattacks
According to a study by Which company, more than 40% of active Android users around the world use OS version 6.0 or earlier. Therefore, they will not receive security updates…
Researchers found about 700 problematic Microsoft subdomains
Vullnerability researchers found about 700 problematic Microsoft subdomains and captured one of them for demonstration. Michel Gaschet, an information security specialist, reported about the problem back in February, and has…