Tag: EN

Microsoft Edge Zero-Day Vulnerability Exploited in the Wild

A zero-day vulnerability in Microsoft Edge, which has been tagged as CVE-2024-4671, has been aggressively exploited by evil organizations, according to reports. This security flaw originates from the Chromium engine that underpins the browser. Chromium is also the foundation for…

LLMs’ Data-Control Path Insecurity

Back in the 1960s, if you played a 2,600Hz tone into an AT&T pay phone, you could make calls without paying. A phone hacker named John Draper noticed that the plastic whistle that came free in a box of Captain…

Why car location tracking needs an overhaul

Refuge robbed: Car location tracking is becoming a tool of control in situations of domestic abuse. It’s time car companies responded. This article has been indexed from Malwarebytes Read the original article: Why car location tracking needs an overhaul

FBCS Collection Agency Data Breach Impacts 2.7 Million

Financial Business and Consumer Solutions (FBCS) says the personal information of 2.7 million was impacted in the recent data breach. The post FBCS Collection Agency Data Breach Impacts 2.7 Million appeared first on SecurityWeek. This article has been indexed from…

Leveraging DNS Tunneling for Tracking and Scanning

We provide a walkthrough of how attackers leverage DNS tunneling for tracking and scanning, an expansion of the way this technique is usually exploited. The post Leveraging DNS Tunneling for Tracking and Scanning appeared first on Unit 42. This article…

HPE Aruba Vulnerabilities: Prevent Systems From RCE Attacks

Recently, HPE Aruba Networking, formerly known as Aruba Networks, has encountered significant security challenges. Vulnerabilities in their ArubaOS, the proprietary network operating system, have been identified, posing serious risks, including remote code execution (RCE). In this article, we delve into…

Hardware Level Vulnerabilities, Revisited

In August of last year, I examined several CPU bugs that posed serious security threats. The mitigations for these vulnerabilities generally involved either incorporating additional instructions or opting for alternative CPU instructions – strategies that lead to diminished system performance…

CISA and FBI Issue Alert on Path Traversal Vulnerabilities

The joint alert from CISA and FBI highlights the continued exploitation of path traversal vulnerabilities in critical infrastructure attacks, impacting sectors like healthcare. The recent CVE-2024-1708 vulnerability in ConnectWise ScreenConnect is a prime example. This flaw was exploited alongside another…

The Importance of Passive Asset Discovery

It’s the fifth requirement in CIS Control 1 : Use a passive asset discovery tool. Sounds simple enough. But what does it mean? And what, specifically, makes it so important that it became one of the first five requirements of…