Security
Headlines
HeadlinesLatestCVEs

Tag

#acer

Backdoor.Win32.Redkod.d MVID-2022-0649 Hardcoded Credential

Backdoor.Win32.Redkod.d malware suffers from a hardcoded credential vulnerability.

Packet Storm
#vulnerability#web#ios#mac#windows#microsoft#redis#backdoor#bios#acer#auth#telnet
Concerns Over Fortinet Flaw Mount; PoC Released, Exploit Activity Grows

The authentication bypass flaw in FortiOS, FortiProxy and FortiSwitchManager is easy to find and exploit, security experts say.

Apple's Constant Battles Against Zero-Day Exploits

Such exploits sell for up to $10 million, making them the single most valuable commodity in the cybercrime underworld.

Celsius Exchange Data Dump Is a Gift to Crypto Sleuths—and Thieves

By releasing half a million users’ transactions in a bankruptcy court filing, the company has opened a vast breach in its users’ financial privacy.

The Fight to Cut Off the Crypto Fueling Russia's Ukraine Invasion

Blockchain investigators have uncovered at least $4 million—and counting—in cryptocurrency fundraising has reached Russia's violent militia groups.

CVE-2022-41523

TOTOLINK NR1800X V9.1.0u.6279_B20210910 was discovered to contain an authenticated stack overflow via the command parameter in the setTracerouteCfg function.

Glut of Fake LinkedIn Profiles Pits HR Against the Bots

A recent proliferation of phony executive profiles on LinkedIn is creating something of an identity crisis for the business networking site, and for companies that rely on it to hire and screen prospective employees. The fabricated LinkedIn identities — which pair AI-generated profile photos with text lifted from legitimate accounts — are creating major headaches for corporate HR departments and for those managing invite-only LinkedIn groups.

The High Cost of Living Your Life Online

Constantly posting content on social media can erode your privacy—and sense of self.

CVE-2022-40710: ZDI-22-1296

A link following vulnerability in Trend Micro Deep Security 20 and Cloud One - Workload Security Agent for Windows could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.

Amid Sweeping Change, Cyber Defenders Face Escalating Visibility — and Pressure

Why cyber teams are now front and center for business enablement within organizations, and the significant challenges they face.