Top

Category: Vulnerabilities


Application security, Security, Threats & Malware, Vulnerabilities

APIs are becoming a major target for credential stuffing attacks

February 19, 2020

Via: CSO Online

New data from security and content delivery company Akamai shows that one in every five attempts to gain unauthorized access to user accounts is now done through application programming interfaces (APIs) instead of user-facing login pages. This trend is even […]


Application security, Security, Threats & Malware, Vulnerabilities

MIT Researchers Find Vulnerabilities in Voatz Voting App

February 14, 2020

Via: Security Week

The application was used during the 2018 midterm elections in West Virginia, and was also deployed in elections in Denver, Oregon, and Utah. It was also used at the 2016 Massachusetts Democratic Convention and the 2016 Utah Republican Convention. Developed […]


Mobile, Mobile security, Threats & Malware, Vulnerabilities

Critical Bluetooth Vulnerability Exposes Android Devices to Attacks

February 7, 2020

Via: Security Week

A total of 25 vulnerabilities were fixed with Android’s February 2020 security updates, and the most important of them are two critical severity issues is System. One of these is CVE-2020-0022, a bug impacting the Bluetooth component, and which can […]


Threats & Malware, Vulnerabilities

Which vulnerabilities were most exploited by cybercriminals in 2019?

February 6, 2020

Via: Help Net Security

Which ten software vulnerabilities should you patch as soon as possible (if you haven’t already)? Recorded Future researchers have analyzed code repositories, underground forum postings, dark web sites, closed source reports and data sets comprising of submissions to popular malware […]


Threats & Malware, Vulnerabilities

Hacking Wi-Fi networks by exploiting a flaw in Philips Smart Light Bulbs

February 6, 2020

Via: Security Affairs

Security experts from Check Point discovered a high-severity flaw (CVE-2020-6007) in Philips Hue Smart Light Bulbs that can be exploited by hackers to gain entry into a targeted WiFi network. Lightbulbs could be remotely controlled through a mobile app or […]


Threats & Malware, Vulnerabilities

Microsoft detects 77,000 active web shells on a daily basis

February 5, 2020

Via: Security Affairs

According to a report published by Microsoft, the company detects an average of 77,000 active web shells, spreading across 46,000 infected servers, on a daily base. A web shell is a code, often written in typical web development programming languages […]


Threats & Malware, Vulnerabilities

80% of successful breaches are from zero-day exploits

January 31, 2020

Via: Help Net Security

Organizations are not making progress in reducing their endpoint security risk, especially against new and unknown threats, a Ponemon Institute study reveals. 68% IT security professionals say their company experienced one or more endpoint attacks that compromised data assets or […]


Threats & Malware, Vulnerabilities

Devices Still Vulnerable to DMA Attacks Despite Protections

January 30, 2020

Via: Security Week

DMA is designed to allow hardware components or peripheral devices to directly access system memory, independently of the operating system and the CPU. The feature, however, can be abused for malicious purposes by an attacker who has gained access to […]


Threats & Malware, Vulnerabilities

Over 200K WordPress sites potentially exposed to hack due to Code Snippets flaw

January 30, 2020

Via: Security Affairs

A high severity cross-site request forgery (CSRF) bug, tracked as CVE-2020-8417, in Code Snippets plugin could be exploited by attackers to take over WordPress sites running vulnerable versions of the Code Snippets plugin. The plugin allows users to execute code […]


Mobile, Mobile security, Threats & Malware, Vulnerabilities

Apple Patches Tens of Vulnerabilities in iOS, macOS Catalina

January 29, 2020

Via: Security Week

A total of 23 vulnerabilities were addressed in iOS 13.3.1 and iPadOS 13.3.1, now rolling out for iPhone 6s and later, iPad Air 2 and later, iPad mini 4 and later, and iPod touch 7th generation. The flaws impact components […]