vulnerability

  1. Father

    Vulnerability in SentrySafe safes allows you to open them using Flipper Zero

    A security researcher demonstrated the hacking method. Pavel Zhovner, a security researcher, demonstrated a method for hacking some electronic safes manufactured by SentrySafe using the Flipper Zero device and exploiting a vulnerability in the controller's control protocol. A detailed video...
  2. Father

    Coffee trap: Nespresso domain vulnerability led to a surge in phishing attacks

    How did a well-known brand suddenly become a participant in a fraudulent scheme? Cybersecurity researchers from Perception Point recently discovered a vulnerability on the website of the manufacturer of coffee machines and capsules Nespresso, which is actively used by fraudsters to redirect...
  3. Father

    82,000 firewalls at risk: a working exploit has been released for a vulnerability in PAN-OS

    Experts from Palo Alto are doing everything possible to protect users, but even this may not be enough. An exploit was recently discovered on the Internet for a critical vulnerability in the PAN-OS software used in Palo Alto Networks firewalls. Vulnerability CVE-2024-3400, which we wrote about...
  4. Father

    Private key theft and server hacking: a critical vulnerability was discovered in PuTTY

    Update the client version before it's too late. PuTTY warn about a critical vulnerability affecting versions from 0.68 to 0.80. The flaw may allow an attacker to fully recover NIST-P521 private keys. Vulnerability CVE-2024-31497 occurs due to failures in the generation of cryptographic ECDSA...
  5. Father

    Is your Intel safe? Microsoft tells you how to protect yourself from the Spectre vulnerability.

    After so many patches: a flaw discovered 6 years ago still threatens our systems. About 6 years ago, vulnerabilities affecting most Intel and AMD processors were discovered. These defects, known as Spectre and Meltdown, can be used to steal sensitive data from compromised systems. In March...
  6. Father

    0-day vulnerability in the n_gsm driver that allows code execution at the Linux kernel level

    Two exploits discovered in the public domain, which involve a previously unknown vulnerability in the n_gsm driver, which is part of the Linux kernel. The vulnerability allows an unprivileged local user to execute code at the kernel level and raise their privileges in the system. No CVE ID...
  7. Father

    Vulnerability in NASA software: a small mistake will lead to an aerodynamic disaster

    An error that threatens accidents during testing of hypersonic weapons has been found. A research team from China has reported a critical flaw in NASA's hypersonic aerodynamics simulation software. This is stated in an article published on March 14 in the authoritative Chinese scientific...
  8. Father

    Scarier than "Rapid Reset": a new fundamental vulnerability has been identified in the HTTPS/2 protocol

    "CONTINUATION Flood" allows you to conduct powerful DoS attacks. A new vulnerability in the HTTP/2 protocol can be used to conduct denial-of-service (DoS) attacks. The discovery, dubbed the "HTTP/2 CONTINUATION Flood", belongs to cybersecurity researcher Bartek Novotarski, who reported the...
  9. Father

    Vulnerability in the io_uring subsystem that allows you to get root privileges

    A vulnerability (CVE-2024-0582) has been identified in the asynchronous io_uring I/O interface provided by the Linux kernel, which allows an unprivileged user to gain root rights in the system. Normal local access to the system is sufficient to exploit the vulnerability, without the need for...
  10. Teacher

    Vulnerability that allows you to insert escape sequences into other people's terminals

    A vulnerability CVE-2024-28085) has been identified in the wall utility, which is supplied in the util-linux package and is intended for sending messages to terminals, which allows an attack on other users terminals by manipulating escape sequences. The problem is caused by the fact that the...
  11. Teacher

    ParaSwap will return funds to users after the vulnerability is detected

    The aggregator of liquidity from decentralized exchanges ParaSwap began to return cryptocurrency to users after fixing a critical vulnerability in the recently launched Augustus v6 smart contract. According to the platform, 213 addresses have not yet revoked their permissions. On March 20...
  12. Teacher

    Vulnerability in the FreeBSD and OpenBSD NFS server that causes remote code execution

    A critical vulnerability (CVE-2024-29937) has been identified in the implementation of the NFS server used by BSD systems, which allows you to remotely execute your code with root rights on the server. The problem appears in all OpenBSD and FreeBSD releases, up to and including OpenBSD 7.4 and...
  13. Teacher

    The vulnerability of the IFTTT autoposting service led to the hacking of crypto-influencers in X

    On March 21, the accounts of several crypto industry influencers in X were compromised to promote the PACKY scam token. Probably, the hacker got access through the automatic post publishing service IFTTT (If This then That). One of the victims was the adviser Andreessen Horowitz (a16z) Packy...
  14. Teacher

    Hackers fix BIG-IP vulnerability themselves: fight for exclusive access to infected systems

    High competition forces you to exploit 5 errors at once to gain access to corporate networks. Mandiant report that Chinese hackers UNC5174 exploit vulnerabilities in popular products to distribute malware that can install additional backdoors on compromised Linux hosts. The UNC5174 attacks...
  15. Teacher

    Vulnerability in the software of the reg.ru client became a loophole for hackers from UHG

    On March 18, attackers attacked the servers of a Russian domain registrar. The Russian domain registrar and hosting provider reg.ru, which serves 44% of domains in the .ru zone, was attacked by hackers. The attackers tried to break into one of the company's virtual hosting servers, the reg.ru...
  16. Teacher

    Windows users, beware: DarkGate exploits a zero-day vulnerability

    The SmartScreen security bug served hackers well. Maybe you also managed to become a victim of it? In mid-January, security researchers noticed a new large-scale campaign to distribute malicious software DarkGate, exploiting a recently fixed vulnerability in the Microsoft Windows security...
  17. Teacher

    The world's largest vulnerability databases have stopped updating

    The US National Vulnerability Database has stopped analyzing vulnerabilities in software and services. It is not maintained for more than a month, which affects the process of eliminating "holes". The same thing happens with the database of well-known information security vulnerabilities-CVE...
  18. Teacher

    Vulnerability in Android 14: Code execution via Bluetooth

    A bug in Pixel 8 allows you to take control of the device. The GrapheneOS project team, which is working on a secure version of the Android Open Source Project (AOSP), has discovered a problem in the Android 14 Bluetooth stack, leading to remote code execution. A Use-After-Free (UAF)...
  19. Teacher

    Moha fixed the vulnerability CVE-2024-1220, which is fraught with a production shutdown

    To fix the breach, you need to install the latest firmware version. Moxa Company thanked Positive Technologies specialists for detecting a dangerous vulnerability in the NPort line of industrial wireless converters. Identified as CVE-2024-1220, this vulnerability received a high score of 8.2 on...
  20. Teacher

    Ivanti failed to fix the vulnerability: almost 700 servers were infected with a DSLog backdoor

    A botched fix allowed hackers to inject a backdoor into the device's codebase. Hackers are exploiting an SSRF (Server-Side Request Forgery) vulnerability in Ivanti Connect Secure (ICS), Policy Secure (IPS), and ZTA products to deploy a new DSLog backdoor on vulnerable devices. Bug...
Top