Tag Archives: vulnerabilities

Hackers are exploiting a critical zeroday in firewalls from SonicWall

reader comments 23 with 16 posters participating Share this story Network security provider SonicWall said on Monday that hackers are exploiting a critical zeroday vulnerability in one of the firewalls it sells. The security flaw resides in the Secure Mobile Access 100 series, SonicWall said in an advisory updated on Monday. The vulnerability, which affects… Read More »

Hackers used 4 zero-days to infect Windows and Android devices

reader comments 8 with 8 posters participating Share this story Google researchers have detailed a sophisticated hacking operation that exploited vulnerabilities in Chrome and Windows to install malware on Android and Windows devices. Some of the exploits were zero-days, meaning they targeted vulnerabilities that at the time were unknown to Google, Microsoft, and most outside… Read More »

Hackers are exploiting a backdoor built into Zyxel devices. Are you patched?

reader comments 60 with 40 posters participating Share this story Hackers are attempting to exploit a recently discovered backdoor built into multiple Zyxel device models that hundreds of thousands of individuals and businesses use as VPNs, firewalls, and wireless access points. The backdoor comes in the form of an undocumented user account with full administrative… Read More »

2020 had its share of memorable hacks and breaches. Here are the top 10

reader comments 15 with 14 posters participating Share this story 2020 was a tough year for a lot of reasons, not least of which were breaches and hacks that visited pain on end users, customers, and the organizations that were targeted. The ransomware menace dominated headlines, with an endless stream of compromises hitting schools, governments,… Read More »

Zero-click iMessage zero-day used to hack the iPhones of 36 journalists

reader comments 43 with 39 posters participating Share this story Three dozen journalists had their iPhones hacked in July and August using what at the time was an iMessage zero-day exploit that didn’t require the victims to take any action to be infected, researchers said. The exploit and the payload it installed were developed and… Read More »

Wormable code-execution flaw in Cisco Jabber has a severity rating of 9.9 out of 10

Getty Images reader comments 40 with 25 posters participating Share this story Cisco has patched its Jabber conferencing and messaging application against a critical vulnerability that made it possible for attackers to execute malicious code that would spread from computer to computer with no user interaction required. Again. The vulnerability, which was first disclosed in… Read More »

GE puts default password in radiology devices, leaving healthcare networks exposed

reader comments 90 with 58 posters participating Share this story Dozens of radiology products from GE Healthcare contain a critical vulnerability that threatens the networks of hospitals and other health providers that use the devices, officials from the US government and a private security firm said on Tuesday. The devices—used for CT scans, MRIs, X-Rays,… Read More »

NSA says Russian state hackers are using a VMware flaw to ransack networks

Enlarge / This image was the profile banner of one of the accounts allegedly run by the Internet Research Agency, the organization that ran social media “influence campaigns” in Russia, Germany, Ukraine, and the US dating back to 2009. A Russian troll reader comments 5 with 5 posters participating Share this story The National Security… Read More »

Android apps with millions of downloads are vulnerable to serious attacks

reader comments 33 with 33 posters participating Share this story Android apps with hundreds of millions of downloads are vulnerable to attacks that allow malicious apps to steal contacts, login credentials, private messages, and other sensitive information. Security firm Check Point said that the Edge Browser, the XRecorder video and screen recorder, and the PowerDirector… Read More »

iPhone zero-click Wi-Fi exploit is one of the most breathtaking hacks ever

Enlarge / That’s a lot of screen. Samuel Axon reader comments 144 with 106 posters participating Share this story Earlier this year, Apple patched one of the most breathtaking iPhone vulnerabilities ever: a memory corruption bug in the iOS kernel that gave attackers remote access to the entire device—over Wi-Fi, with no user interaction required… Read More »