Tag Archives: vulnerabilities

Critical Zoom vulnerabilities fixed last week required no user interaction

reader comments 2 with 2 posters participating Share this story Google’s Project Zero vulnerability research team detailed critical vulnerabilities Zoom patched last week making that made it possible for hackers to execute zero-click attacks that remotely ran malicious code on devices running the messaging software. Tracked as CVE-2022-22786 and CVE-2022-22784, the vulnerabilities made it possible… Read More »

2 vulnerabilities with 9.8 severity ratings are under exploit. A 3rd looms

Getty Images reader comments 4 with 4 posters participating Share this story Malicious hackers, some believed to be state-backed, are actively exploiting two unrelated vulnerabilities—both with severity ratings of 9.8 out of a possible 10—in hopes of infecting sensitive enterprise networks with backdoors, botnet software, and other forms of malware. The ongoing attacks target unpatched… Read More »

Zyxel silently patches command injection vulnerability with 9.8 severity rating

reader comments 7 with 6 posters participating, including story author Share this story Hardware manufacturer Zyxel quietly released an update fixing a critical vulnerability that gives hackers the ability to control tens of thousands of firewall devices remotely. The vulnerability, which allows remote command injection with no authentication required, carries a severity rating of 9.8… Read More »

Trend says hackers have weaponized SpringShell to install Mirai malware

Getty Images reader comments 3 with 3 posters participating Share this story Researchers on Friday said that hackers are exploiting the recently discovered SpringShell vulnerability to successfully infect vulnerable Internet of Things devices with Mirai, an open-source piece of malware that wrangles routers and other network-connected devices into sprawling botnets. When SpringShell (also known as… Read More »

Zyxel patches critical vulnerability that can allow Firewall and VPN hijacks

reader comments 5 with 5 posters participating Share this story Hardware manufacturer Zyxel has issued patches for a highly critical security flaw that gives malicious hackers the ability to take control of a wide range of firewalls and VPN products the company sells to businesses. The flaw is an authentication bypass vulnerability that stems from… Read More »

Explaining Spring4Shell: The Internet security disaster that wasn’t

Getty Images reader comments 8 with 8 posters participating Share this story Hype and hyperbole were on full display this week as the security world reacted to reports of yet another Log4Shell. The vulnerability came to light in December and is arguably one of the gravest Internet threats in years. Christened Spring4Shell—the new code-execution bug… Read More »

Researcher uses Dirty Pipe exploit to fully root a Pixel 6 Pro and Samsung S22

reader comments 24 with 21 posters participating Share this story A researcher has successfully used the critical Dirty Pipe vulnerability in Linux to fully root two models of Android phones—a Pixel 6 Pro and Samsung S22—in a hack that demonstrates the power of exploiting the newly discovered OS flaw. The researcher chose those two handset… Read More »

Linux has been bitten by its most high-severity vulnerability in years

reader comments 52 with 45 posters participating Share this story Linux has yet another high-severity vulnerability that makes it easy for untrusted users to execute code capable of carrying out a host of malicious actions including installing backdoors, creating unauthorized user accounts, and modifying scripts or binaries used by privileged services or apps. Dirty Pipe,… Read More »

Attackers can force Amazon Echos to hack themselves with self-issued commands

Enlarge / A group of Amazon Echo smart speakers, including Echo Studio, Echo, and Echo Dot models. (Photo by Neil Godwin/Future Publishing via Getty Images) T3 Magazine/Getty Images reader comments 19 with 14 posters participating Share this story Academic researchers have devised a new working exploit that commandeers Amazon Echo smart speakers and forces them… Read More »