Tag: vulnerability

Here you will find all the articles with the tag: vulnerability.

GIFShell attacks Microsoft Teams users with GIFs

GIFShell attacks Microsoft Teams users with GIFs

GIFShell is attacking Microsoft Teams users by making them download malicious files on their system via GIFs. A new malware attack has been surfacing over the past few weeks. GIFShell was created to intercept Microsoft Teams and execute phishing attacks using GIFs. Although many people enjoy a g... Read more

date2 years ago
Cisco won’t address vulnerability in legacy VPN routers

Cisco won’t address vulnerability in legacy VPN routers

Cisco isn't planning on resolving a recently discovered vulnerability in its VPN router models for SMBs. The organization said the models reached end-of-life (EoL) status and won't be updated as a result. The vulnerability (CVE-2022-20923) was found in the RV110W, RV130, RV130W and RV215W. Acco... Read more

date2 years ago
Atlassian warns of critical vulnerability in Bitbucket

Atlassian warns of critical vulnerability in Bitbucket

Atlassian issued a security alert for its Bitbucket Server and Datacenter solution. A vulnerability allows hackers to execute arbitrary code on affected instances. Bitbucket is a Git-based code tool for hosting, management and collaboration. The tool integrates with Atlassian's Jira and Trello s... Read more

date2 years ago
VPNs on iOS devices allegedly leak network traffic

VPNs on iOS devices allegedly leak network traffic

Research proves that VPNs running on Apple devices keep the connection insecure and open, leading to data exposure. Earlier this week, a security researcher revealed that iOS devices do not fully secure the network traffic and connection through VPNs as one would expect. According to a tech s... Read more

date2 years ago
Vulnerability in Palo Alto Networks’ devices allows DDoS attacks

Vulnerability in Palo Alto Networks’ devices allows DDoS attacks

Palo Alto Networks warns of a major vulnerability in its PAN-OS operating system. The OS is included in the security provider's solutions. Palo Alto Networks indicates that the vulnerability (CVE-2022-0028) is actively exploited and highly sensitive. The bug allows unauthenticated hackers to per... Read more

date2 years ago
5G has serious vulnerabilities for IoT services

5G has serious vulnerabilities for IoT services

Researchers at the Technical University of Berlin discovered serious security risks in IoT applications on 5G networks. According to the researchers, the vulnerabilities primarily originate in the APIs with which operators help customers make IoT data accessible to developers. These APIs are br... Read more

date2 years ago
Critical vulnerabilities found in Zoom, fix available

Critical vulnerabilities found in Zoom, fix available

Zoom's automatic update functionality contains vulnerabilities that allow cybercriminals to gain full control over devices. The issue was discovered by Mac security expert Patrick Wardle. The first vulnerability concerns the signature check of the videoconferencing platform. This check reviews t... Read more

date2 years ago
SGX, Intel’s seemingly secure data fortress, has been breached

SGX, Intel’s seemingly secure data fortress, has been breached

The ÆPIC leak CPU bug spills users' sensitive and confidential data in seconds from Intel SGX enclaves. Intel's latest CPUs contain a major vulnerability that enables attackers to achieve encryption keys as well as other private data protected by its SGX. This cutting-edge feature works as a va... Read more

date2 years ago
VMware patches critical bug in Workspace ONE Access and vRealize

VMware patches critical bug in Workspace ONE Access and vRealize

VMware warns of an authentication vulnerability that could allow hackers to gain administrator privileges. The vulnerability affects Workspace ONE Access, Identity Manager and vRealize Automation. The vulnerability was dubbed CVE-2022-31656 and given a high-priority status. Administrators are ad... Read more

date2 years ago
New macOS malware uses public cloud storage as control server

New macOS malware uses public cloud storage as control server

Security researchers warn macOS users of a newly discovered malware variant that steals sensitive data from vulnerable Macs via an undocumented backdoor. The malware uses public cloud storage like Yandex Disk and Dropbox as its command and control (C2) channel to steal data such as keystrokes an... Read more

date2 years ago
1 8 9 10 11 12 18