Malvertising Campaigns Skirt Ad Blockers, Serve Up Mac Malware
The RIG exploit kit and Safari redirects are both in the adversaries’ bag of tricks.
The RIG exploit kit and Safari redirects are both in the adversaries’ bag of tricks.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
A researcher said that he found a Honda ElasticSearch database exposing 40GB of internal system and device data.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
What could be more horrifying than knowing that a hacker can trick the plane’s electronic systems into displaying false flight data to the pilot, which could eventually result in loss of control? Of course, the attacker would never wish to be on the same flight, so in this article, we are going to talk about…
Remote exploitation can be achieved with no user interaction.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
Hackers with physical access to small aircraft can easily hack the plane’s CAN bus system and take control of key navigation systems.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
If your e-commerce website runs on the OXID eShop platform, you need to update it immediately to prevent your site from becoming compromised. Cybersecurity researchers have discovered a pair of critical vulnerabilities in OXID eShop e-commerce software that could allow unauthenticated attackers to take full control over vulnerable eCommerce websites remotely in less than a…
Google’s cybersecurity researchers have finally disclosed details and proof-of-concept exploits for 4 out of 5 security vulnerabilities that could allow remote attackers to target Apple iOS devices just by sending a maliciously-crafted message over iMessage. All the vulnerabilities, which required no user interaction, were responsibly reported to Apple by Samuel Groß and Natalie Silvanovich of…
Another week, another massive data breach. Capital One, the fifth-largest U.S. credit-card issuer and banking institution, has recently suffered a data breach exposing the personal information of more than 100 million credit card applicants in the United States and 6 million in Canada. The data breach that occurred on March 22nd and 23rd this year…
Standard email authentication to prevent spoofing and phishing remains elusive for most.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
Security researchers have discovered almost a dozen zero-day vulnerabilities in VxWorks, one of the most widely used real-time operating systems (RTOS) for embedded devices that powers over 2 billion devices across aerospace, defense, industrial, medical, automotive, consumer electronics, networking, and other critical industries. According to a new report Armis researchers shared with The Hacker News…