Tag
#apple
FTPManager version 8.2 suffers from local file inclusion and directory traversal vulnerabilities.
The Blink1Control2 application <= 2.2.7 uses weak password encryption and an insecure method of storage.
The high stakes and unique priorities for Internet of Medical Things devices require specialized cybersecurity strategies.
Wifi HD Wireless Disk Drive version 11 suffers from a local file inclusion vulnerability.
The phishing-as-a-service offering targets accounts from tech giants, and also has connections to PyPI phishing and the Twilio supply chain attack.
By Owais Sultan Nomad Crypto incident was reported in August 2022 in which $190 million were stolen in a series of hacks. This is a post from HackRead.com Read the original post: The Lessons to Learn from Nomad Crypto Hack
A new phishing-as-a-service (PhaaS) toolkit dubbed EvilProxy is being advertised on the criminal underground as a means for threat actors to bypass two-factor authentication (2FA) protections employed against online services. "EvilProxy actors are using reverse proxy and cookie injection methods to bypass 2FA authentication – proxifying victim's session," Resecurity researchers said in a Monday
This is a proof of concept exploit for the Apple macOS remote events remote memory corruption vulnerability. It serves as a toolkit to help debug and trigger crashes.
A vulnerability was found in SourceCodester Clinics Patient Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file medicine_details.php. The manipulation of the argument medicine leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-207854 is the identifier assigned to this vulnerability.
The notorious Android banking trojan known as SharkBot has once again made an appearance on the Google Play Store by masquerading as antivirus and cleaner apps. "This new dropper doesn't rely on Accessibility permissions to automatically perform the installation of the dropper Sharkbot malware," NCC Group's Fox-IT said in a report. "Instead, this new version asks the victim to install the