Tag Archives: exploits

This is not a drill: VMware vuln with 9.8 severity rating is under attack

reader comments 40 with 35 posters participating Share this story A VMware vulnerability with a severity rating of 9.8 out of 10 is under active exploitation. At least one reliable exploit has gone public, and there have been successful attempts in the wild to compromise servers that run the vulnerable software. The vulnerability, tracked as… Read More »

No, it doesn’t just crash Safari. Apple has yet to fix exploitable flaw

reader comments 35 with 25 posters participating, including story author Share this story Apple has yet to patch a security bug found in iPhones and Macs despite the availability of a fix released almost three weeks ago, a researcher said. The vulnerability resides in WebKit, the browser engine that powers Safari and all browsers that… Read More »

4 vulnerabilities under attack give hackers full control of Android devices

reader comments 24 with 21 posters participating Share this story Unknown hackers have been exploiting four Android vulnerabilities that allow the execution of malicious code that can take complete control of devices, Google warned on Wednesday. All four of the vulnerabilities were disclosed two weeks ago in Google’s Android Security Bulletin for May. Google has… Read More »

Apple reports 2 iOS 0-days that let hackers compromise fully patched devices

Enlarge / The 2020 iPhone lineup. From left to right: iPhone 12 Pro Max, iPhone 12 Pro, iPhone 12, iPhone SE, and iPhone 12 mini. reader comments 37 with 30 posters participating Share this story A week after Apple issued its biggest iOS and iPadOS update since last September’s release of version 14.0, the company… Read More »

More US agencies potentially hacked, this time with Pulse Secure exploits

Getty Images reader comments 23 with 19 posters participating Share this story At least five US federal agencies may have experienced cyberattacks that targeted recently discovered security flaws that give hackers free rein over vulnerable networks, the US Cybersecurity and Infrastructure Security Agency said on Friday. The vulnerabilities in Pulse Connect Secure, a VPN that… Read More »

Actively exploited Mac 0-day neutered core OS security defenses

Getty Images reader comments 63 with 54 posters participating Share this story When Apple released the latest version 11.3 for macOS on Monday, it didn’t just introduce support for new features and optimizations. More importantly, the company fixed a zero-day vulnerability that hackers were actively exploiting to install malware without triggering core Mac security mechanisms,… Read More »

In epic hack, Signal developer turns the tables on forensics firm Cellebrite

reader comments 38 with 31 posters participating Share this story For years, Israeli digital forensics firm Cellebrite has helped governments and police around the world break into confiscated mobile phones, mostly by exploiting vulnerabilities that went overlooked by device manufacturers. Now, Moxie Marlinspike—the brainchild behind the Signal messaging app—has turned the tables. On Wednesday, Marlinspike… Read More »

Hackers are exploiting a Pulse Secure 0-day to breach orgs around the world

reader comments 51 with 41 posters participating Share this story Hackers backed by nation-states are exploiting critical vulnerabilities in the Pulse Secure VPN to bypass two-factor authentication protections and gain stealthy access to networks belonging to a raft of organizations in the US Defense industry and elsewhere, researchers said. At least one of the security… Read More »

Windows and Linux devices are under attack by a new cryptomining worm

Getty Images reader comments 15 with 13 posters participating Share this story A newly discovered cryptomining worm is stepping up its targeting of Windows and Linux devices with a batch of new exploits and capabilities, a researcher said. Research company Juniper started monitoring what it’s calling the Sysrv botnet in December. One of the botnet’s… Read More »

How a VPN vulnerability allowed ransomware to disrupt two manufacturing plants

Getty Images reader comments 15 with 13 posters participating Share this story Ransomware operators shut down two production facilities belonging to a European manufacturer after deploying a relatively new strain that encrypted servers that control manufacturer’s industrial processes, a researcher from Kaspersky Lab said on Wednesday. The ransomware known as Cring came to public attention… Read More »