News

iphones

A researcher discovered a BootROM exploit that works on almost all iOS devices out there. The exploit requires physical access…

|
Last updated September 23, 2021
signal

Signal vulnerable to an auto-answer exploit, which requires a modified client for the caller. The attacker may activate the microphone…

|
Last updated September 23, 2021
Drupal logo

Unpatched Drupal systems are being targeted by powerful malware based on a year-old flaw. The actors have several specialized PoC…

|
Last updated September 23, 2021
D-Link

D-Link acknowledged the recent flaw in their home Wi-Fi routers, but they’re not planning to fix it. Those who have…

|
Last updated September 23, 2021
hp_quarters

HP’s hardware performance monitoring tool is vulnerable to severe remote execution attacks. The tool runs on high system privileges but…

|
Last updated September 23, 2021
apple zero day

Researchers have discovered a blunder in Bonjour’s coding, which introduces a well-documented flaw. A capable group of malicious actors have…

|
Last updated September 23, 2021
sudo

A researcher discovered a severe flaw in the sudo program, which enables root command execution by anyone. The trick is…

|
Last updated September 23, 2021
Google Chrome

Update your Chrome browser immediately, as a flaw discovered by Kaspersky Labs is under active exploitation. Not many technical details…

|
Last updated September 23, 2021
Computer Data Code

The first BlueKeep cyberattack is just about dropping a Monero miner. This is a work of amateurs, but things are…

|
Last updated September 23, 2021
mcafee

Three McAfee security products have been found to be vulnerable to system-takeover attacks. The attack method is similar to what…

|
Last updated September 23, 2021
Windows Alternatives - Feature Image

The November Windows patch is out, and it comes with a large number of critical fixes. All users are urged…

|
Last updated September 23, 2021
docker container

Unit42 presents a proof of concept code that works well in unpatched Docker installations. Admins who failed to apply the…

|
Last updated September 23, 2021
Symantec_Headquarters_Mountain_View

Symantec’s Endpoint Security belongs to the big group of security apps that don’t validate DLL files. SafeBreach researchers have developed…

|
Last updated September 23, 2021
android bloatware

Many widely used applications on the Android ecosystem are using vulnerable native libraries. The app maintainers don’t pay much attention…

|
Last updated September 23, 2021
google pixel camera

Researchers discovered alarming camera app flaws spread across the Android ecosystem. The PoC can activate the camera silently, steal media…

|
Last updated September 23, 2021
truecaller

Truecaller could allow an attacker to inject a malicious link as a profile URL, exploiting targets on the platform. The…

|
Last updated September 23, 2021
DLL file

Kaspersky, Autodesk, and Trend Micro in the spotlight again for severe privilege escalation vulnerabilities. Researchers from SafeBreach discovered that some…

|
Last updated September 23, 2021
WordPress logo

Two popular “Ultimate Addons” plugins allow hackers to take full control of WordPress websites. The only thing that the attacker…

|
Last updated September 23, 2021
citrix

Researcher discovers a highly critical vulnerability that affects widely-used Citrix software products. The vulnerability takes only a minute to exploit…

|
Last updated September 23, 2021
nvidia experience

NVIDIA fixes a severe vulnerability in the GeForce companion app, which leads to privilege escalation and DoS. The actor would…

|
Last updated September 23, 2021
For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: