Latest News

2019/08/12

Vulnerabilities in WhatsApp can allow attackers to intercept and manipulate user messages

Researchers from Israeli security company Check Point have identified three attack modes in WhatsApp which can be exploited to intercept and manipulate users’ messages.

Apparently, these security issues were revealed to WhatsApp last year. However, they remain exploitable even after one year.

Stuart Peck, director of the cybersecurity strategy at ZeroDayLab, claims that WhatsApp flaws pose a serious security issue given that it still hasn’t been addressed. He further added that "the integrity of messages received from trusted sources is vital if users are going to trust encrypted messaging services like WhatsApp."
Source: cyware.com
2019/08/12

Vulnerabilities in Device Drivers From 20 Vendors Expose PCs to Persistent Malware

Researchers at firmware security company Eclypsium have analyzed device drivers from major vendors and identified over 40 drivers from 20 firms containing serious vulnerabilities that can be exploited to deploy persistent malware.

Device drivers provide access to the BIOS/UEFI or other system components with the purpose of allowing users to update firmware, perform diagnostics, and change settings. However, vulnerabilities in these drivers can pose a serious threat as they can allow an attacker to escalate privileges to the highest level and become highly persistent.
2019/08/02

Google Researchers Disclose PoCs for 4 Remotely Exploitable iOS Flaws

Google's cybersecurity researchers have finally disclosed details and proof-of-concept exploits for 4 out of 5 security vulnerabilities that could allow remote attackers to target Apple iOS devices just by sending a maliciously-crafted message over iMessage.
All the vulnerabilities, which required no user interaction, were responsibly reported to Apple by Samuel Groß and Natalie Silvanovich of Google Project Zero, which the company patched just last week with the release of the latest iOS 12.4 update.
2019/08/02

Unprotected Elasticsearch database belonging to Honda exposes 134 million records of employee data

Security researcher Justin Paine discovered an unprotected Elasticsearch instance belonging to Honda, which was publicly accessible without any authentication.
The leaky database contained information for over 300,000 employees across the globe, which included employees’ names, email addresses, their last login, their computers' endpoint security vendor network information, OS versions, hostnames, and patch status.
Source: cyware.com
2019/07/22

Mirai Botnet Sees Big 2019 Growth, Shifts Focus to Enterprises

The infamous Mirai internet of things botnet is spiking in growth while changing up its tactics, techniques and procedures so far in 2019, to target more and more enterprise-level hardware, It’s a state of affairs that presents a greater concern than ever before given the ongong migration to the cloud era, researchers said.

According to researchers at IBM X-Force, Mirai is now made up of several different related botnets, which sometimes compete with each other. Since bursting on the scene with a massive DDoS takedown of DNS provider Dyn – which impacted vast swathes of the internet including major sites like Twitter, Spotify and GitHub – the botnet has proliferated into at least 63 Mirai variants, the firm said.