Tag Archives: vulnerabilities

Unlimited miles and nights: Vulnerability found in rewards programs

reader comments 17 with Travel rewards programs like those offered by airlines and hotels tout the specific perks of joining their club over others. Under the hood, though, the digital infrastructure for many of these programs—including Delta SkyMiles, United MileagePlus, Hilton Honors, and Marriott Bonvoy—is built on the same platform. The backend comes from the… Read More »

Firmware vulnerabilities in millions of computers could give hackers superuser status

reader comments 27 with Two years ago, ransomware crooks breached hardware-maker Gigabyte and dumped more than 112 gigabytes of data that included information from some of its most important supply-chain partners, including Intel and AMD. Now researchers are warning that the leaked information revealed what could amount to critical zero-day vulnerabilities that could imperil huge… Read More »

MOVEit app mass-exploited last month patches new critical vulnerability

reader comments 21 with MOVEit, the file-transfer software exploited in recent weeks in one of the biggest cyberattacks ever, has received yet another security update that fixes a critical vulnerability that could be exploited to give hackers access to vast amounts of sensitive data. On Thursday, MOVEit maker Progress Software published a security bulletin that… Read More »

Mastodon fixes critical “TootRoot” vulnerability allowing node hijacking

reader comments 12 with The maintainers of the open source software that powers the Mastodon social network published a security update on Thursday that patches a critical vulnerability making it possible for hackers to backdoor the servers that push content to individual users. Mastodon is based on a federated model. The federation comprises thousands of… Read More »

Actively exploited vulnerability threatens hundreds of solar power stations

Getty Images reader comments 8 with Hundreds of Internet-exposed devices inside solar farms remain unpatched against a critical and actively exploited vulnerability that makes it easy for remote attackers to disrupt operations or gain a foothold inside the facilities. The devices, sold by Osaka, Japan-based Contec under the brand name SolarView, help people inside solar… Read More »

Researchers tell owners to “assume compromise” of unpatched Zyxel firewalls

Getty Images reader comments 5 with Firewalls made by Zyxel are being wrangled into a destructive botnet, which is taking control of them by exploiting a recently patched vulnerability with a severity rating of 9.8 out of a possible 10. “At this stage if you have a vulnerable device exposed, assume compromise,” officials from Shadowserver,… Read More »

Exploit released for 9.8-severity PaperCut flaw already under attack

Getty Images reader comments 20 with Share this story Exploit code for a critical printer software vulnerability became publicly available on Monday in a release that may exacerbate the threat of malware attacks that have already been underway for the past five days. The vulnerability resides in print management software known as PaperCut, which the… Read More »

Hackers exploit WordPress plugin flaw that gives full control of millions of sites

Getty Images reader comments 19 with Share this story Hackers are actively exploiting a critical vulnerability in a widely used WordPress plugin that gives them the ability to take complete control of millions of sites, researchers said. The vulnerability, which carries a severity rating of 8.8 out of a possible 10, is present in Elementor… Read More »

Ransomware crooks are exploiting IBM file exchange bug with a 9.8 severity

reader comments 6 with Share this story Threat actors are exploiting a critical vulnerability in an IBM file-exchange application in hacks that install ransomware on servers, security researchers have warned. The IBM Aspera Faspex is a centralized file-exchange application that large organizations use to transfer large files or large volumes of files at very high… Read More »

Google tells users of some Android phones: Nuke voice calling to avoid infection

Enlarge / Images of the Samsung Galaxy S21, which runs with an Exynos chipset. reader comments 89 with Share this story Google is urging owners of certain Android phones to take urgent action to protect themselves from critical vulnerabilities that give skilled hackers the ability to surreptitiously compromise their devices by making a specially crafted… Read More »