exploits

Unpatched Linux bug may open devices to serious attacks over Wi-Fi

A potentially serious vulnerability in Linux may make it possible for nearby devices to use Wi-Fi signals to crash or fully compromise vulnerable machines, a security researcher said. The flaw is located in the RTLWIFI driver, which is used to support Realtek Wi-Fi chips in Linux devices. The vulnerability triggers a buffer overflow in the […]

Unpatched Linux bug may open devices to serious attacks over Wi-Fi Read More »

Activists’ phones targeted by one of the world’s most advanced spyware apps

Mobile phones of two prominent human rights activists were repeatedly targeted with Pegasus, the highly advanced spyware made by Israel-based NSO, researchers from Amnesty International reported this week. The Moroccan human rights defenders received SMS text messages containing links to malicious sites. If clicked, the sites would attempt to install Pegasus, which as reported here

Activists’ phones targeted by one of the world’s most advanced spyware apps Read More »

Attackers exploit an iTunes zeroday to install ransomware

Attackers exploited a zeroday vulnerability in Apple’s iTunes and iCloud programs to infect Windows computers with ransomware without triggering antivirus protections, researchers from Morphisec reported on Thursday. Apple patched the vulnerability earlier this week. The vulnerability resided in the Bonjour component that both iTunes and iCloud for Windows relies on, according to a blog post.

Attackers exploit an iTunes zeroday to install ransomware Read More »

Attackers exploit 0-day vulnerability that gives full control of Android phones

Attackers are exploiting a zero-day vulnerability in Google’s Android mobile operating system that can give them full control of at least 18 different phone models, including four different Pixel models, a member of Google’s Project Zero research group said on Thursday night. There’s evidence the vulnerability is being actively exploited, either by exploit developer NSO

Attackers exploit 0-day vulnerability that gives full control of Android phones Read More »

Webkit zero-day exploit besieges Mac and iOS users with malvertising redirects

Enlarge / Artist’s impression of a malicious hacker coding up a BlueKeep-based exploit. Attackers have bombarded the Internet with more than 1 billion malicious ads in less than two months. The attackers targeted iOS and macOS users with what were zero-day vulnerabilities in Chrome and Safari browsers that were recently patched, researchers said on Monday.

Webkit zero-day exploit besieges Mac and iOS users with malvertising redirects Read More »

Developer of Checkm8 explains why iDevice jailbreak exploit is a game changer

Enlarge / The bootrom of an Apple Watch Series 3, as shown through a hex viewer. Yep, Apple Watches series 1, 2, and 3 are also vulnerable to Checkm8. Often, when new iOS jailbreaks become public, the event is bittersweet. The exploit allowing people to bypass restrictions Apple puts into the mobile operating system allows

Developer of Checkm8 explains why iDevice jailbreak exploit is a game changer Read More »

Exploit for wormable BlueKeep Windows bug released into the wild

Aurich Lawson For months, security practitioners have worried about the public release of attack code exploiting BlueKeep, the critical vulnerability in older versions of Microsoft Windows that’s “wormable,” meaning it can spread from computer to computer the way the WannaCry worm did two years ago. On Friday, that dreaded day arrived when the Metasploit framework—an

Exploit for wormable BlueKeep Windows bug released into the wild Read More »

Apple takes flak for disputing iOS security bombshell dropped by Google

Apple is taking flak for disputing some minor details of last week’s bombshell report that, for at least two years, customers’ iOS devices were vulnerable to a sting of zeroday exploits, at least some of which were actively exploited to install malware that stole location data, passwords, encryption keys, and a wealth of other highly

Apple takes flak for disputing iOS security bombshell dropped by Google Read More »

Zero-day privilege escalation disclosed for Android

Researchers have disclosed a zero-day vulnerability in the Android operating system that gives a major boost to attackers who already have a toe-hold on an affected device. The privilege-escalation flaw is located in the V4L2 driver, which Android and other Linux-based OSes use to capture real-time video. The vulnerability results from a “lack of validating

Zero-day privilege escalation disclosed for Android Read More »

A glut of iOS 0-days pushes their price below cost of those for Android

For the first time ever, the security exploit broker Zerodium is paying a higher price for zero-day attacks that target Android than it pays for comparable attacks targeting iOS. An updated price list published Tuesday shows Zerodium will now pay $2.5 million apiece for “full chain (Zero-Click) with persistence” Android zero-days compared with $2 million

A glut of iOS 0-days pushes their price below cost of those for Android Read More »

?
WP Twitter Auto Publish Powered By : XYZScripts.com