Top

Tag: vulnerabilities


Threats & Malware, Vulnerabilities

Hackers Earn $275,000 for Vulnerabilities in U.S. Army Systems

January 17, 2020

Via: Security Week

The challenge ran between October 9 and November 15, 2019, and was the result of a partnership between the Defense Digital Service, the U.S. Department of Defense (DoD), and hacker-powered pentesting platform HackerOne. The second Army bug bounty program saw […]


Network security, Security

Cable Haunt: Millions of Cable Modems With Broadcom Chips Vulnerable to Attacks

January 10, 2020

Via: Security Week

The vulnerability, dubbed Cable Haunt and tracked as CVE-2019-19494, was identified by researchers from Lyrebirds and an independent expert. They’ve reproduced the attack on ten cable modems from Sagemcom, Netgear, Technicolor and COMPAL, but other manufacturers also likely use the […]


Email security

Why the 2020 US presidential election is still vulnerable to foreign interference

January 8, 2020

Via: Help Net Security

With the international political situation becoming increasingly fraught and divisive, it is hard to ignore the shadow of foreign interference looming over electoral proceedings around the world. Not only are the US elections arguably some of the most influential on […]


Mobile, Wireless security

Major vulnerabilities found in popular wireless presentation system

December 17, 2019

Via: Help Net Security

F-Secure consultants have discovered several exploitable vulnerabilities in Barco’s ClickShare wireless presentation system. Attackers can use the flaws to intercept and manipulate information during presentations, steal passwords and other confidential information, and install backdoors and other malware. Popular attack targets […]


Vulnerabilities

Vulnerability Allows Hackers to Take Control of ABB Substation Protection Devices

December 2, 2019

Via: Security Week

A critical vulnerability affecting some Relion protection devices from ABB can be exploited to take control of a device or cause it to become inoperable, the DHS’s Cybersecurity and Infrastructure Security Agency (CISA) warned last week. The flaw affects Relion […]


Threats & Malware, Vulnerabilities

Cisco Fixes High-Risk Vulnerabilities in Some Small Business RV Series Routers

November 12, 2019

Via: Hot for Security

A number of Cisco Small Business RV Series Routers series were found to be vulnerable to a couple of attacks, and Cisco was quick to explain what the vulnerabilities were and that the patches were issued. Cisco confirmed that command […]


Editorial

The New Cold Boot Attack Leaves Most Systems Vulnerable

November 4, 2019

Via: William Palmer

Security researchers have recently found that almost “all modern computers” are vulnerable to a modified version of the old cold boot attacks.  This new version, discovered by a Finnish company last year, can interfere with a machine’s firmware in order […]


Threats & Malware, Virus & Malware, Vulnerabilities

ICS Attackers Set To Inflict More Damage With Evolving Tactics

October 31, 2019

Via: Threat Post

Future attacks on industrial control system (ICS) networks may inflict even more damage in the long run, according to new research. Analysts expect them to evolve from attacks that have immediate, direct impact to those with multiple stages and attack […]


Cloud security, Security

IaaS cloud vulnerabilities expected to increase 50% over 2018 figures

October 28, 2019

Via: Help Net Security

Although the total number of IaaS cloud vulnerabilities is still small and the technology relatively young, volumes are increasing year-over-year at a steady rate, an expected to hit 50-percent growth by the end of 2019, Skybox reveals. Key findings of […]


Threats & Malware, Vulnerabilities

Cisco closes high-impact vulnerabilities in its security offerings

October 7, 2019

Via: Help Net Security

Cisco has fixed 18 high-impact vulnerabilities affecting several of its security offerings and is advising administrators to test and implement the offered security updates as soon as possible. “Successful exploitation of the vulnerabilities could allow an attacker to gain unauthorized […]