Technology

Attackers Can Weaponize Firewalls and Middleboxes for Amplified DDoS Attacks

Weaknesses in the implementation of TCP protocol in middleboxes and censorship infrastructure could be weaponized as a vector to stage reflected denial of service (DoS) amplification attacks, surpassing many of the existing UDP-based amplification factors to date. Detailed by a group of academics from the University of Maryland and the University of Colorado Boulder at the USENIX […]

Attackers Can Weaponize Firewalls and Middleboxes for Amplified DDoS Attacks Read More »

Dozens of STARTTLS Related Flaws Found Affecting Popular Email Clients

Security researchers have disclosed as many as 40 different vulnerabilities associated with an opportunistic encryption mechanism in mail clients and servers that could open the door to targeted man-in-the-middle (MitM) attacks, permitting an intruder to forge mailbox content and steal credentials. The now-patched flaws, identified in various STARTTLS implementations, were detailed by a group of

Dozens of STARTTLS Related Flaws Found Affecting Popular Email Clients Read More »

New AdLoad Variant Bypasses Apple’s Security Defenses to Target macOS Systems

A new wave of attacks involving a notorious macOS adware family has evolved to leverage around 150 unique samples in the wild in 2021 alone, some of which have slipped past Apple’s on-device malware scanner and even signed by its own notarization service, highlighting the malicious software ongoing attempts to adapt and evade detection. “AdLoad,”

New AdLoad Variant Bypasses Apple’s Security Defenses to Target macOS Systems Read More »

New Glowworm Attack Recovers Device’s Sound from Its LED Power Indicator

A novel technique leverages optical emanations from a device’s power indicator LED to recover sounds from connected peripherals and spy on electronic conversations from a distance of as much as 35 meters. Dubbed the “Glowworm attack,” the findings were published by a group of academics from the Ben-Gurion University of the Negev earlier this week,

New Glowworm Attack Recovers Device’s Sound from Its LED Power Indicator Read More »

Facebook Adds End-to-End Encryption for Audio and Video Calls in Messenger

Facebook on Friday said it’s extending end-to-end encryption (E2EE) for voice and video calls in Messenger, along with testing a new opt-in setting that will turn on end-to-end encryption for Instagram DMs. “The content of your messages and calls in an end-to-end encrypted conversation is protected from the moment it leaves your device to the

Facebook Adds End-to-End Encryption for Audio and Video Calls in Messenger Read More »

Learn Ethical Hacking From Scratch — 18 Online Courses for Just $43

If you’re reading this post, there is a pretty good chance you’re interested in hacking. Ever thought about turning it into a career? The cybersecurity industry is booming right now, and ethical hacking is one of the most lucrative and challenging niches. It’s open to anyone with the right skills. Featuring 18 courses from top-rated

Learn Ethical Hacking From Scratch — 18 Online Courses for Just $43 Read More »

Hackers Spotted Using Morse Code in Phishing Attacks to Evade Detection

Microsoft has disclosed details of an evasive year-long social engineering campaign wherein the operators kept changing their obfuscation and encryption mechanisms every 37 days on average, including relying on Morse code, in an attempt to cover their tracks and surreptitiously harvest user credentials. The phishing attacks take the form of invoice-themed lures mimicking financial-related

Hackers Spotted Using Morse Code in Phishing Attacks to Evade Detection Read More »

Ransomware Gangs Exploiting Windows Print Spooler Vulnerabilities

Ransomware operators such as Magniber and Vice Society are actively exploiting vulnerabilities in Windows Print Spooler to compromise victims and spread laterally across a victim’s network to deploy file-encrypting payloads on targeted systems. “Multiple, distinct threat actors view this vulnerability as attractive to use during their attacks and may indicate that this vulnerability will

Ransomware Gangs Exploiting Windows Print Spooler Vulnerabilities Read More »

Hackers Actively Searching for Unpatched Microsoft Exchange Servers

Threat actors are actively carrying out opportunistic scanning and exploitation of Exchange servers using a new exploit chain leveraging a trio of flaws affecting on-premises installations, making them the latest set of bugs after ProxyLogon vulnerabilities were exploited en masse at the start of the year. The remote code execution flaws have been collectively dubbed “ProxyShell.” At least

Hackers Actively Searching for Unpatched Microsoft Exchange Servers Read More »