BrakTooth vulnerabilities threaten billions of devices around the world
A group of researchers has published information on 16 serious vulnerabilities, dubbed BrakTooth, which threaten billions of devices around the world. Vulnerabilities affect the Bluetooth stack in many popular SoCs…
Researchers spot a tool to hide malware in AMD and Nvidia GPUs for sale
Bleeping Computer discovered that an exploit that uses the memory buffer of AMD and Nvidia GPUs to store malware and execute it, appeared for sale on a hacker forum. In…
ProxyToken Vulnerability Allows Stealing Mail Through Microsoft Exchange
A dangerous vulnerability called ProxyToken has been discovered in Microsoft Exchange. An attacker can exploit this problem by making requests to the Exchange Control Panel (ECP) web services and stealing…
Microsoft warned of a critical vulnerability in Cosmos DB
Microsoft has warned thousands of Azure customers of a critical Cosmos DB vulnerability. The bug allows any user remote database management, and grants administrator rights without the need for authorization.…
LockFile ransomware adopts ProxyShell and PetitPotam vulnerabilities
The new LockFile ransomware exploits recently discovered ProxyShell and PetitPotam vulnerabilities to increase its chances of hacking and encrypting corporate networks. Experts from TG Soft and well-known information security researcher…
Over 2000 Exchange Servers Hacked Using ProxyShell Exploit
Researchers at Huntress Labs estimate that over the past few days, about 2,000 Microsoft Exchange mail servers have been compromised and infected with backdoors, because their owners have not installed…
Experts list 15 most attacked Linux vulnerabilities
Trend Micro has published a list of the top threats and most attacked vulnerabilities for Linux in the first half of 2021. The results were obtained from honeypots, sensors and…
Due to Razer Synapse vulnerability, connecting a mouse to a Windows machine gives system privileges
A security researcher known as jonhat discovered a 0-day vulnerability in Razer Synapse, thanks to which user can gain Windows administrator rights by simply connecting a Razer mouse or keyboard…
Attackers hacked the US Census Bureau using Citrix exploit
The Office of the Inspector General (OIG) reported that unknown attackers hacked the servers of the US Census Bureau on January 11, 2020. To do this, a zero-day Citrix ADC…
Vulnerabilities in STARTTLS threaten popular email clients
At the USENIX conference, a group of German scientists announced the discovery of more than 40 vulnerabilities in STARTTLS implementations in popular mail clients and servers, including Apple Mail, Gmail,…
List of suspects in terrorism that are monitored by the FBI leaked to the network
A copy of the FBI's Terrorist Screening Center (TSC) list has Leaked to the network. It is a list of suspects in terrorism that are monitored by FBI. The database…
Hackers exploit ProxyShell vulnerabilities to install backdoors
Experts warn that hackers are attacking Microsoft Exchange servers, exploiting ProxyShell vulnerabilities, and installing backdoors on them for subsequent access. Let me remind you that the vulnerabilities, which are collectively…