Tag Archives: Vulnerabilities

Google Warns Zero-Day Bug For Android Under Active Attack

Google has stated a warning of an Android zero-day flaw actively being exploited in the wild. This flaw impacts 18 Android models including Google’s flagship Pixel, Samsung, Huawei and Xiaomi. Project Zero member Maddie Stone wrote in a technical post . which said the unpatched vulnerability(CVE-2019-2215) can be exploited in several ways. In one scenario, a…

Read More

Comodo Forums Hacked By Exploiting vBulletin Flaw

Comodo, one of the largest SSL Security Certificate Authorities notifies that their vBulletin Forum has been hacked. Comodo Group reported that 170,000 forum users had their data stolen by a hacker who exploited a recently disclosed vulnerability in vBulletin’s internet forum software. Comodo notifies its forum users According to the announcement from Comodo, an attacker exploited…

Read More

Xeon and Other Intel CPUs Hit by NetCAT Security Vulnerability

Intel’s server-grade processors are suffering from a vulnerability, which they dubbed NetCAT. The researchers at Vrije University in Amsterdam revealed on Wednesday The vulnerability enables a side-channel attack that can infer what a CPU is working on and is said to rely on issues with two Intel technologies found primarily in the Xeon CPU line: Data-Direct I/O Technology…

Read More

Social Media Website Logins Can Compromise Your Account

Many websites are offering alternative login methods but they could potentially compromise your social media account if your not careful. Our attention to internet security has been 110% focus these days. Why use them? Google, Facebook, LinkedIn and Microsoft all offer multi-factor authentication meaning that if someone guesses, steals or cracks your password then they…

Read More

Millions of Qualcomm based Android Smartphones Vulnerable

Security researchers from Tencent’s Blade Team released a notice that the Qualcomm chipset exposes millions of android smartphones to hackers. Any user with a tablet or phone that uses this cpu is effected by the flaw called QualPwn. The bug allows attackers to take control of the phones remotely by crafting special packets that are…

Read More

Windows Actively Exploited Privilege-Escalation Bugs

The software giant recently released important-level patches for two of the privilege-escalation vulnerabilities in Win32k and splwow64, which are being actively exploited in the wild. Qualys said that the patches, though labeled as important, should be quickly deployed as they could be chained with other vulnerabilities to provide the hacker with complete system access. In…

Read More

Dell SupportAssist Software Is Vulnerable To Remote Hacker

Millions of Dell PCs that have the SupportAssist software installed are vulnerable to a remote hacker to completely taking over your computer. The high-severity vulnerability (CVE-2019-12280) is defective coding in a component in SupportAssist. This software is Dell’s monitoring software which is pre-installed on all PCs. The software can automatic detect failure and notify you of…

Read More

Linux servers under worm attacks via latest Exim flaw

It didn’t take very long for Hackers to start exploiting this flaw, the recently revealed Exim vulnerability (CVE-2019-10149).   An initial wave of attacks on this vulnerability – which involved attackers pushing out exploits from a malicious command-and-control (C2) server – was first discovered June 9 by researcher Freddie Leeman. “Just detected the first attempts to exploit…

Read More