Menu

Vulnerability

All articles and tutorials tagged #Vulnerability
Two zero day flaws in iOS Mail threaten billions of iPhone and iPad
Two zero day flaws in iOS Mail threaten billions of iPhone and iPad

Researchers have discovered two zero-day vulnerabilities on iOS affecting the Mail application on iPhones and iPads. These relatively old flaws are actively [...]

VulnerabilityFlawAttackAppleiOSMail
VMware fixes a critical vulnerability in vCenter Server 6.7
VMware fixes a critical vulnerability in vCenter Server 6.7

VMware has just released a fix for a highly critical scored 10 on the CVSSv3 scale found in Directory Service (vmdir), the directory service implemented with [...]

VMwarevCentervSpherevmdirFlawVulnerabilityCVE
500 Chrome Extensions Caught Stealing Data of Million Users
500 Chrome Extensions Caught Stealing Data of Million Users

500 Google Chrome extensions secretly uploaded private data from millions of users. The technique used by hackers, called malvertising, remains difficult to [...]

ChromeExtensionsMalvertisingVulnerabilityPhishingFraud
Hackers can Steal Data by Tweaking Monitors Brightness
Hackers can Steal Data by Tweaking Monitors Brightness

Israeli researchers at Ben-Gurion University detailed a method, dubbed Brightness, to steal data from computers by capturing brightness video changes of the [...]

ScreenCameraBrightnessVulnerabilityAir-GapInvisible
Exploit Shellshock Vulnerability CVE 2014-6271 using Metasploit
Exploit Shellshock Vulnerability CVE 2014-6271 using Metasploit

A recent study from November 2019 shows that the security vulnerability called ShellShock CVE-2014-6271 discovered in 2014 would still be present on a large [...]

BashMetasploitOpenSSHShellshockVulnerability
WhatsApp MP4 Videos Flaw allows Hackers to execute Code Remotely
WhatsApp MP4 Videos Flaw allows Hackers to execute Code Remotely

A new bug on Whatsapp, based on MP4 videos flaws, has been revealed by Facebook. This vulnerability could lead to denial of service attacks or remote code [...]

FacebookWhatsAppFlawVideoVulnerabilityCVEMP4
A variant of Zombieload flaw hits Intel's Newest Cascade Lake Chips
A variant of Zombieload flaw hits Intel's Newest Cascade Lake Chips

After Spectre and Meltdown, another vulnerability affects Intel processors. A variant of the Zombieland attack would target chips under micro-architecture [...]

ZombieloadSpectreMeltdownVulnerabilityFlawAttackXeon
The Bluekeep Exploit is back and is used to install Cryptominer
The Bluekeep Exploit is back and is used to install Cryptominer

Recently one Cyber-Security researcher discovered that the vulnerability BlueKeep was back and was used to install cryptominer remotely on compromised machines.

BlueKeepRDPCryptominerXMRMoneroWindowsVulnerability