Security
Headlines
HeadlinesLatestCVEs

Tag

#apple

FTPManager 8.2 Local File Inclusion / Directory Traversal

FTPManager version 8.2 suffers from local file inclusion and directory traversal vulnerabilities.

Packet Storm
#vulnerability#web#ios#mac#apple#auth#ssh#webkit
CVE-2022-35513: Releases · todbot/Blink1Control2

The Blink1Control2 application <= 2.2.7 uses weak password encryption and an insecure method of storage.

The 3 Fundamentals of Building an Effective IoMT Security Strategy

The high stakes and unique priorities for Internet of Medical Things devices require specialized cybersecurity strategies.

Wifi HD Wireless Disk Drive 11 Local File Inclusion

Wifi HD Wireless Disk Drive version 11 suffers from a local file inclusion vulnerability.

EvilProxy Commodifies Reverse-Proxy Tactic for Phishing, Bypassing 2FA

The phishing-as-a-service offering targets accounts from tech giants, and also has connections to PyPI phishing and the Twilio supply chain attack.

The Lessons to Learn from Nomad Crypto Hack

By Owais Sultan Nomad Crypto incident was reported in August 2022 in which $190 million were stolen in a series of hacks. This is a post from HackRead.com Read the original post: The Lessons to Learn from Nomad Crypto Hack

New EvilProxy Phishing Service Allowing Cybercriminals to Bypass 2-Factor Security

A new phishing-as-a-service (PhaaS) toolkit dubbed EvilProxy is being advertised on the criminal underground as a means for threat actors to bypass two-factor authentication (2FA) protections employed against online services. "EvilProxy actors are using reverse proxy and cookie injection methods to bypass 2FA authentication – proxifying victim's session," Resecurity researchers said in a Monday

Apple macOS Remote Events Memory Corruption

This is a proof of concept exploit for the Apple macOS remote events remote memory corruption vulnerability. It serves as a toolkit to help debug and trigger crashes.

CVE-2022-3122: webray.com.cn/cpmssql.md at main · joinia/webray.com.cn

A vulnerability was found in SourceCodester Clinics Patient Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file medicine_details.php. The manipulation of the argument medicine leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-207854 is the identifier assigned to this vulnerability.

Fake Antivirus and Cleaner Apps Caught Installing SharkBot Android Banking Trojan

The notorious Android banking trojan known as SharkBot has once again made an appearance on the Google Play Store by masquerading as antivirus and cleaner apps. "This new dropper doesn't rely on Accessibility permissions to automatically perform the installation of the dropper Sharkbot malware," NCC Group's Fox-IT said in a report. "Instead, this new version asks the victim to install the