Browsing category

Vulnerability

CVE/vulnerability, Cyber Security News, Firefox, Firefox 66.0.1, security updates, Vulnerability,

Firefox 66.0.1 Released with Fix for Critical Security Vulnerabilities

Firefox 66.0.1

Firefox 66.0.1 Released with Fix for Critical Security Vulnerabilities that discovered via Trend Micro’s Zero Day Initiative. The vulnerability affects all the versions of Firefox below 66.0.1. An attacker could exploit these vulnerabilities to take complete control over the target system of the process. CVE-2019-9810: Incorrect alias information Incorrect alias information with IonMonkey JIT compiler […]

The post Firefox 66.0.1 Released with Fix for Critical Security Vulnerabilities appeared first on GBHackers On Security.

Exploit, Uncategorized, Vulnerability, Word press, Wordpress, WordPress Plugins, Zeo day, ZERO day,

Zero-day Stored XSS Vulnerability in WordPress Social Share Plug-in let Hackers to Compromise 70,000 Websites

Zero-day Stored XSS

Researchers discovered a critical Stored XSS Zero-day flaw in widely used social sharing plug-in called “Social Warfare” let attackers inject the malicious script and take over the vulnerable WordPress websites. Social Warfare, a social sharing plugin for WordPress powered by Warfare Plugins that help to get more social shares for WordPress based website developers which […]

The post Zero-day Stored XSS Vulnerability in WordPress Social Share Plug-in let Hackers to Compromise 70,000 Websites appeared first on GBHackers On Security.

"Edge", Computer Security, Ethical Hackers, Exploit, Firefox, Pwn2Own, Pwn2Own 2019, Uncategorized, vmware, Vulnerability, Windows, ZDI, ZERO day,

Pwn2Own 2019 – Firefox, Edge, Windows, VMware Hacked – Ethical Hackers Earned $270,000 USD in Day 2

Pwn2Own

In the second day of Pwn2Own 2019 contest, Ethical Hackers compromised Microsoft Edge, Mozilla Firefox, Windows, VMware and earned $270,000 USD in a single day by submitting 9 unique zero-day exploits. The first day, 2 teams of researchers and 2 independent researchers have been made $240,000 USD by reporting 9 zero-day bugs in Safari, VMware, […]

The post Pwn2Own 2019 – Firefox, Edge, Windows, VMware Hacked – Ethical Hackers Earned $270,000 USD in Day 2 appeared first on GBHackers On Security.

2-Factor Authentication, BitLocker, Cryptography, Microsoft, Organisations, Security threats, tpm, Trusted Platform Modules, Vulnerability, Windows, Windows 10,

Researcher finds new way to sniff Windows BitLocker encryption keys

A researcher has published a new and relatively simple way that Windows BitLocker encryption keys can be sniffed in less secure configurations as they travel from Trusted Platform Modules (TPMs) during boot.

This post appeared first on Naked Security Blog by Sophos
Author: John E Dunn

CVE/vulnerability, Cyber Security News, Google Photos, Internet, Vulnerability,

Google Photos Vulnerability Allows Hackers To Track Location History

Google Photos Vulnerability

A vulnerability exists with the web version of Google photos allows malicious websites to extract the photos metadata information. Google photos will tag your photos automatically based on the metadata information such as geographic coordinates, date, etc. The Photo metadata allows information to be traveled along with the image file that can be read by […]

The post Google Photos Vulnerability Allows Hackers To Track Location History appeared first on GBHackers On Security.

APT, Backdoor, Exploit, Goldmouse APT group, Malware, Vulnerability, WinRAR, Word documents,

APT-C-27 Hackers Launching njRAT Backdoor via Weaponized Word Documents to Control the Compromised Device

njRAT Backdoor

Goldmouse APT group (APT-C-27) now start exploiting the WinRAR vulnerability (CVE-2018-20250[6]) to hide the njRAT backdoor and targeting users reside in the Middle East via decoy Word document to compromise and control the device. The 19-year-old vulnerability was disclosed by checkpoint security researchers last week, the vulnerability resides in the WinRAR UNACEV2.DLL library. Since the vulnerability has […]

The post APT-C-27 Hackers Launching njRAT Backdoor via Weaponized Word Documents to Control the Compromised Device appeared first on GBHackers On Security.

Computer Security, Cyber Attack, Exploit, Malware, Ransomware, Vulnerability, Windows, WinRAR,

Alert !! Hackers Launching New JNEC.a Ransomware via WinRAR Exploits – Do not Pay

JNEC.a Ransomware

A brand new JNEC.a ransomware spreading via recently discovered WinRAR vulnerability exploit to compromise windows computer & demand the ransom amount. This exploits leverage the recently discovered WinRAR ACE code injection vulnerability, since then attackers continuously exploiting to intrude the targeted system in various ways. WinRAR is the worlds most popular Compression tool that used […]

The post Alert !! Hackers Launching New JNEC.a Ransomware via WinRAR Exploits – Do not Pay appeared first on GBHackers On Security.