Billions of mobile, desktop and IoT devices that use Bluetooth may be exposed to a new stealthy remote attack dubbed BlueBorne attack. Billions of mobile, desktop and IoT devices that use Bluetooth may be exposed to a new remote attack, even without any user interaction and pairing. The unique condition […]
Compromised LinkedIn accounts used to send phishing links via private message and InMail
Phishing continues to be a criminals’ favorite for harvesting user credentials with more or less sophisticated social engineering tricks. In this post, we take a look at a recent attack that uses existing LinkedIn user accounts to send phishing links to their contacts via private message but also to external […]
ADOBE FIXES EIGHT VULNERABILITIES IN FLASH, ROBOHELP, COLDFUSION
Adobe fixed eight vulnerabilities across three products, including two critical memory corruption bugs and a critical XML parsing flaw, with its regularly scheduled update on Tuesday. RoboHelp for Windows, ColdFusion, and as usual, Flash Player, all received updates as part of the company’s Patch Tuesday security bulletins. Versions 26.0.0.151 and […]
VMWARE PATCHES BUG THAT ALLOWS GUEST TO EXECUTE CODE ON HOST
Users who run four different types of VMware products, ESXi, vCenter Server, Fusion and Workstation, are being encouraged to update to address a series of vulnerabilities, one critical. The most serious issue, an out-of-bounds write vulnerability, exists in ESXi, and desktop hypervisors Workstation, and Fusion. An attacker could exploit the […]
ANDROID USERS VULNERABLE TO ‘HIGH-SEVERITY’ OVERLAY ATTACKS
Security researchers warned of a high-severity Android flaw on Thursday that stems from what they call a “toast attack” overlay vulnerability. Researchers say criminals could use the Android’s toast notification, a feature that provides simple feedback about an operation in a small pop up, in an attack scenario to obtain […]
Google Chrome most resilient against attacks, researchers find
Researchers have analyzed Google Chrome, Microsoft Edge, and Internet Explorer, and found Chrome to be the most resilient against attacks. “Modern web browsers such as Chrome or Edge improved security in recent years. Exploitation of vulnerabilities is certainly more complex today and requires a higher skill than in the past. […]
Global DDoS mitigation market trends and developments
Frost & Sullivan found that the DDoS mitigation market generated a revenue of $816 million in 2016 and is expected to register a CAGR of 17.1 percent through 2021. Threat actors’ continuous development of new techniques to overwhelm their target’s defenses and improve effectiveness of their DDoS attacks in terms of scale, […]
More than 700 million email addresses leaked in huge data breach
A spambot has leaked more than 700 million email addresses and passwords publicly in a huge data breach. The data dump occurred thanks to a misconfigured spambot, dubbed ‘Onliner’, and was discovered by a Paris-based security researcher known as Benkow. Troy Hunt, an Australian computer security expert, who runs the […]
WikiLeaks suffers defacement at the hands of OurMine group
WikiLeaks’ whistleblowing website suffered an attack from the group known as OurMine on Thursday, when Julian Assange’s data-leaking site found itself on the receiving end of a ‘hack’. To read the original article : https://www.welivesecurity.com/2017/09/01/wikileaks-suffer-defacement-ourmine-group/
Equifax confirms up to 400,000 UK consumers at risk after data breach
One week after publicly revealing that a data breach had exposed the personal information and social security numbers of up to 143 million American consumers, the credit reporting agency has revealed more details of just how many people are affected in the UK. Although Equifax’s UK systems are said not […]