Please turn on your JavaScript for this page to function normally.
How attackers exploit whitelists

If there is a technology or security measure that can help organizations protect their assets from attackers or malware, you can be sure that attackers will try to find a way …

Microsoft
Actively exploited zero-day in IIS 6.0 affects 60,000+ servers

Microsoft Internet Information Services (IIS) 6.0 sports a zero-day vulnerability (CVE-2017-7269) that was exploited in the wild last summer and is likely also being exploited …

Miele washer
Medical washer-disinfector appliance’s web server open to attack

Here’s a string of words that you probably never thought you’ll hear: An Internet-connected washer-disinfector appliance by German manufacturer Miele sports a …

Windows
Hijacking Windows user sessions with built-in command line tools

Did you know that by using built-in command line tools, any user with system rights and permissions (usually a local administrator) can hijack the session of any logged-in …

Ubiquiti Networks NanoStation
Unpatched flaw opens Ubiquiti Networks devices to compromise

A critical vulnerability in many of Ubiquiti Networks’ networking devices can be exploited by attackers to take over control of the device and, if that device acts as a …

Microsoft
By the end of March no one will remember that Microsoft missed a Patch Tuesday

Like the weather in Minnesota, the March Patch Forecast is unpredictable at best. Be prepared for turbulent times interspersed with moments of calm. Will March Patch Tuesday …

Apache Struts
Apache servers under attack through easily exploitable Struts 2 flaw

A critical vulnerability in Apache Struts 2 is being actively and heavily exploited, even though the patch for it has been released on Monday. System administrators are …

Researchers bypass ASLR protection with simple JavaScript code

A group of researchers from the Systems and Network Security Group at VU Amsterdam have discovered a way to bypass address space layout randomization (ASLR) protections of …

WordPress
Tens of thousands WordPress sites defaced, SEO spam to follow

Attackers are actively exploiting the recently patched unauthenticated privilege escalation vulnerability in WordPress’ REST API to deface websites. Sucuri, the company …

Microsoft Windows
Exploit for Windows DoS zero-day published, patch out on Tuesday?

A zero-day bug affecting Windows 10, 8.1, Windows Server 2012 and 2016 can be exploited to crash a vulnerable system and possibly even to compromise it. The bug It is a memory …

Cisco WebEx
Cisco WebEx extension opens Chrome users to drive-by malware attacks

Windows users who have the widely used Cisco WebEx extension installed on Chrome are in danger of getting silently hacked when visiting a malicious website. The vulnerability, …

shadow
Shadow Brokers say goodbye, leak a batch of Windows hacking tools

The Shadow Brokers, a group (?) of hackers that has made a big splash in August last year by leaking and offering for sale exploits supposedly stolen from the infamous …

Don't miss

Cybersecurity news