Exploit
Targeted Attacks Part 3 – The Exploit
Tom Eston | | attacks, Cybersecurity, Digital Privacy, Episodes, Exploit, Exploits, Malware, Monthly Edition, Phishing, Podcast, pretext, Privacy, social engineering, Targeted attacks
In our October monthly episode we finish our three part series on targeted attacks. In this episode we discuss the exploit and malware analysis with special guest Tyler Hudak, Incident Response Practice ...
Severe TeamViewer Vulnerability Let Attackers Steal System Password
A security researcher found a severe TeamViewer vulnerability affecting Windows versions of the application 8 through 15, allowing attackers to steal system credentials. TeamViewer is a powerful tool for remote administration, but ...
Zero-Day Vulnerability in Zoom Affected Windows 7 Users
A zero-day vulnerability affecting the Zoom client for Windows has been discovered that would allow an attacker to execute arbitrary code on remote devices. Only Windows 7 and older OSes were affected, ...
F5 BIG-IP Exploit, WiFi Router Security Updates, Password Reuse
Tom Eston | | credential stuffing, credentials, Cybersecurity, Digital Privacy, Episodes, Exploit, F5 BIG-IP, passwords, Podcast, Privacy, rce, vulnerability, Weekly Edition, wifi
In episode 129 for July 13th 2020: Impact of the F5-BIG-IP critical vulnerability, security updates and your WiFi router, and details about new research that shows how billions of compromised credentials are ...
Adobe to Remove Flash Download Links, Recommends People Uninstall It Now
Adobe is taking further steps in its Flash-dismantling process scheduled to take place by the end of 2020, and said users should uninstall it long before the end-of-life date. Removing Flash from ...
A Couple Critical Zoom Chat Vulnerabilities Found and Fixed
Silviu STAHIE | | cisco, encryption, end-to-end encryption, Exploit, GIFs, Industry News, update, Zoom
Security researchers found a couple of vulnerabilities affecting the chat features of the popular video conferencing app Zoom that, if exploited, would have let attackers achieve arbitrary code execution. While the mere ...
Most Apps Use Vulnerable Open-Source Libraries, Veracode Research Shows
Silviu STAHIE | | applications, Exploit, Industry News, open source, security, Veracode, vulnerability
New research from Veracode found that most applications use open-source libraries that also present vulnerabilities, but the distribution of such libraries depends on the programming languages used. Open-source libraries are ubiquitous, but ...
Thunderspy Attack Affects all Computers with Thunderbolt Released in the Past Decade
Silviu STAHIE | | Exploit, Industry News, Linux, macos, Thunderbolt, Thunderspy, vulnerability, Windows
A slew of seven vulnerabilities identified in the Thunderbolt port allow an attacker with physical access to the device to bypass all security, no matter the platform. It affects all laptops and ...
Zoom Phishing Campaign Tricks People into Revealing Login Credentials
Silviu STAHIE | | credentials, Exploit, Industry News, Phishing, security, vulnerability, Zoom, Zoom-bombing
A new Zoom phishing campaign preys on people’s fears related to job security, tricking them into revealing credentials that criminals can abuse in a variety of ways. The practice of Zoom-bombing is ...
Some Users Lost Access to Their Nintendo Accounts
The Nintendo accounts of an unspecified number of users were compromised in the past few days in an attack from an unknown vector, at least for now. In just a few days, ...

