Skip to content

Vulnerabilities

Discussion related to Vulnerabilities

368 Topics 368 Posts
  • 0 Votes
    1 Posts
    97 Views
    CerberusC

    A year-old proof-of-concept attack that allows an attacker to bypass TLS email protections to snoop on messages has been patched.

    https://threatpost.com/email-bug-message-snooping-credential-theft/167125/

  • 0 Votes
    1 Posts
    97 Views
    CerberusC

    These code bombs lurk in the PyPI package repository, waiting to be inadvertently baked into software developers’ applications.

    https://threatpost.com/cryptominers-python-supply-chain/167135/

  • 0 Votes
    1 Posts
    92 Views
    CerberusC

    Company finally rolls out the complete fix this week for an RCE flaw affecting some 800,000 devices that could result in crashes or prevent users from connecting to corporate resources.

    https://threatpost.com/sonicwall-botches-critical-vpn-bug/167152/

  • 0 Votes
    1 Posts
    113 Views
    CerberusC

    A pair of zero-days affecting Pling-based marketplaces could allow for some ugly attacks on unsuspecting Linux enthusiasts – with no patches in sight.

    https://threatpost.com/unpatched-linux-marketplace-bugs-rce/167155/

  • 0 Votes
    1 Posts
    155 Views
    CerberusC

    An attacker with initial physical access (say, at a gym) could gain root entry to the interactive tablet, making for a bevy of remote attack scenarios.

    https://threatpost.com/peloton-bike-bug-hackers-control/166960/

  • 0 Votes
    1 Posts
    125 Views
    CerberusC

    Hank Schless, senior manager of security solutions at Lookout, notes basic steps that organizations can take to protect themselves as ransomware gangs get smarter.

    https://threatpost.com/takeaways-colonial-pipeline-ransomware/166980/

  • 0 Votes
    1 Posts
    120 Views
    CerberusC

    The intro-level networking gear for SMBs could allow remote attacks designed to steal information, drop malware and disrupt operations.

    https://threatpost.com/cisco-smart-switches-security-holes/167031/

  • 0 Votes
    1 Posts
    149 Views
    CerberusC

    What’s the low-hanging fruit for ransomware attackers? What steps could help to fend them off, and what’s stopping organizations from implementing those steps?

    https://threatpost.com/ransomware-sitting-duck/167040/