Tag Archives: exploits

0-days sold by Austrian firm used to hack Windows users, Microsoft says

Enlarge (credit: Getty Images) Microsoft said on Wednesday that an Austria-based company named DSIRF used multiple Windows and Adobe Reader zero-days to hack organizations located in Europe and Central America. Multiple news outlets have published articles like this one, which cited marketing materials and other evidence linking DSIRF to Subzero, a malicious toolset for “automated… Read More »

Botched and silent patches from Microsoft put customers at risk, critics say

Enlarge (credit: Drew Angerer | Getty Images) Blame is mounting on Microsoft for what critics say is a lack of transparency and adequate speed when responding to reports of vulnerabilities threatening its customers, security professionals said. Microsoft’s latest failing came to light on Tuesday in a post that showed Microsoft taking five months and three… Read More »

Meeting Owl videoconference device used by govs is a security disaster

reader comments 65 with 53 posters participating Share this story The Meeting Owl Pro is a videoconference device with an array of cameras and microphones that captures 360-degree video and audio and automatically focuses on whoever is speaking to make meetings more dynamic and inclusive. The consoles, which are slightly taller than an Amazon Alexa… Read More »

Omnipotent BMCs from Quanta remain vulnerable to critical Pantsdown threat

Getty Images reader comments 33 with 32 posters participating Share this story In January 2019, a researcher disclosed a devastating vulnerability in one of the most powerful and sensitive devices embedded into modern servers and workstations. With a severity rating of 9.8 out of 10, the vulnerability affected a wide range of baseboard management controllers… Read More »

Critical Zoom vulnerabilities fixed last week required no user interaction

reader comments 2 with 2 posters participating Share this story Google’s Project Zero vulnerability research team detailed critical vulnerabilities Zoom patched last week making that made it possible for hackers to execute zero-click attacks that remotely ran malicious code on devices running the messaging software. Tracked as CVE-2022-22786 and CVE-2022-22784, the vulnerabilities made it possible… Read More »

2 vulnerabilities with 9.8 severity ratings are under exploit. A 3rd looms

Getty Images reader comments 4 with 4 posters participating Share this story Malicious hackers, some believed to be state-backed, are actively exploiting two unrelated vulnerabilities—both with severity ratings of 9.8 out of a possible 10—in hopes of infecting sensitive enterprise networks with backdoors, botnet software, and other forms of malware. The ongoing attacks target unpatched… Read More »

Hackers hammer SpringShell vulnerability in attempt to install cryptominers

Getty Images reader comments 5 with 4 posters participating Share this story Malicious hackers have been hammering servers with attacks that exploit the recently discovered SpringShell vulnerability in an attempt to install cryptomining malware, researchers said. SpringShell came to light late last month when a researcher demonstrated how it could be used to remotely execute… Read More »

Trend says hackers have weaponized SpringShell to install Mirai malware

Getty Images reader comments 3 with 3 posters participating Share this story Researchers on Friday said that hackers are exploiting the recently discovered SpringShell vulnerability to successfully infect vulnerable Internet of Things devices with Mirai, an open-source piece of malware that wrangles routers and other network-connected devices into sprawling botnets. When SpringShell (also known as… Read More »

Zyxel patches critical vulnerability that can allow Firewall and VPN hijacks

reader comments 5 with 5 posters participating Share this story Hardware manufacturer Zyxel has issued patches for a highly critical security flaw that gives malicious hackers the ability to take control of a wide range of firewalls and VPN products the company sells to businesses. The flaw is an authentication bypass vulnerability that stems from… Read More »

Explaining Spring4Shell: The Internet security disaster that wasn’t

Getty Images reader comments 8 with 8 posters participating Share this story Hype and hyperbole were on full display this week as the security world reacted to reports of yet another Log4Shell. The vulnerability came to light in December and is arguably one of the gravest Internet threats in years. Christened Spring4Shell—the new code-execution bug… Read More »