HackDig : Dig high-quality web security articles

Exchange Exploitation: Not Dead Yet

The mass exploitation of Exchange Servers has been a wake-up call, and it will take all parties playing in concert for the industry to react, respond, and recover."March Madness" is a jovial nickname for the third month of the year — but in 2021, the cybersecurity industry felt the brunt of March madness for a reason other than basketball: mass exploit
Publish At:2021-05-10 11:07 | Read:71 | Comments:0 | Tags: exploit

TsuNAME Vulnerability Can Be Exploited for DDoS Attacks on DNS Servers

Some DNS resolvers are affected by a vulnerability that can be exploited to launch distributed denial-of-service (DDoS) attacks against authoritative DNS servers, a group of researchers warned this week.The flaw, dubbed TsuNAME, was discovered by researchers at SIDN Labs (the R&D team of the registry for .nl domains), InternetNZ (the registry for .nz dom
Publish At:2021-05-07 08:45 | Read:119 | Comments:0 | Tags:NEWS & INDUSTRY Vulnerabilities DDOS Vulnerability explo

Qualcomm Modem Chip Flaw Exploitable From Android: Researchers

Billions of Android devices are exposed to a vulnerability in Qualcomm’s Mobile Station Modem (MSM) chipA vulnerability in Qualcomm’s Mobile Station Modem (MSM) chip– installed in around 30% of the world’s mobile devices – can be exploited from within Android.MSM is of great interest to both hackers and researchers looking for ways it might be exploited remo
Publish At:2021-05-06 13:10 | Read:144 | Comments:0 | Tags:Mobile Security NEWS & INDUSTRY exploit android

Google Makes Chrome for Windows More Resilient to Vulnerability Exploitation

Starting with version 90, Chrome for Windows improves resilience against vulnerability exploitation by adopting Hardware-enforced Stack Protection.With this mitigation technology, which is available in Windows 10 20H1 or later, on processors that feature Control-flow Enforcement Technology (CET), the processor maintains a shadow stack of valid return address
Publish At:2021-05-05 09:45 | Read:162 | Comments:0 | Tags:NEWS & INDUSTRY Vulnerabilities Vulnerability exploit

Google Chrome adopts Windows 10 exploit protection feature

Google Chrome now hinders attackers' efforts to exploit security bugs on systems with Intel 11th Gen or AMD Zen 3 CPUs, running Windows 10 2004 or later.This is possible after the adoption of Intel's Control-flow Enforcement Technology (CET), supported on Windows 10 computers through an implementation known as Hardware-enforced Stack Protectio
Publish At:2021-05-04 15:49 | Read:118 | Comments:0 | Tags:Security Google exploit

Most of Exim email servers could be hacked by exploiting 21Nails flaws

The maintainers of the Exim email server software addressed a collection of 21 issues, dubbed 21Nails, that can allow attackers to fully compromise mail servers. The maintainers of the Exim email server software have released security updates to address a collection of 21 vulnerabilities, dubbed 21Nails, that can be exploited by attackers to take over ser
Publish At:2021-05-04 15:29 | Read:66 | Comments:0 | Tags:Breaking News Security 21Nails Cybersecurity cybersecurity n

Expert released PoC exploit for Microsoft Exchange flaw

Security researcher released technical details and a PoC code for a high-severity vulnerability in Microsoft Exchange Server reported by the NSA. A security expert released technical details and proof-of-concept exploit (PoC) code for the high-severity vulnerability CVE-2021-28482 in Microsoft Exchange that could be exploited by remote attackers to execut
Publish At:2021-05-03 19:54 | Read:253 | Comments:0 | Tags:Breaking News Hacking Cybersecurity cybersecurity news hacki

PoC exploit released for Microsoft Exchange bug dicovered by NSA

Technical documentation and proof-of-concept exploit (PoC) code is available for a high-severity vulnerability in Microsoft Exchange Server that could let remote attackers execute code on unpatched machines.The flaw is for one of the four that the National Security Agency (NSA) reported to Microsoft and received a fix in April.Despite being the least severe
Publish At:2021-05-03 16:19 | Read:130 | Comments:0 | Tags:Security exploit

Pulse Secure fixes zero-day in Pulse Connect Secure (PCS) SSL VPN actively exploited

Pulse Secure has fixed a zero-day flaw in the Pulse Connect Secure (PCS) SSL VPN appliance that threat actors are actively exploiting in the wild. Pulse Secure has addressed a zero-day vulnerability (CVE-2021-22893) in the Pulse Connect Secure (PCS) SSL VPN appliance that is being actively exploited by threat actors in attacks against defense firms and go
Publish At:2021-05-03 15:59 | Read:154 | Comments:0 | Tags:Breaking News Hacking Security CVE-2021-22893 Cybersecurity

Tesla Car Hacked Remotely From Drone via Zero-Click Exploit

Two researchers have shown how a Tesla — and possibly other cars — can be hacked remotely without any user interaction. They carried out the attack from a drone.This was the result of research conducted last year by Ralf-Philipp Weinmann of Kunnamon and Benedikt Schmotzle of Comsecuris. The analysis was initially carried out for the Pwn2Own 2020 hacking comp
Publish At:2021-05-03 10:45 | Read:147 | Comments:0 | Tags:NEWS & INDUSTRY Wireless Security Vulnerabilities Mobile

UNC2447 cybercrime gang exploited SonicWall Zero-Day before it was fixed

UNC2447 cybercrime gang exploited a zero-day in the Secure Mobile Access (SMA), addressed by SonicWall earlier this year, before the vendor released a fix. Researchers from FireEye’s Mandiant revealed that a sophisticated cybercrime gang tracked as UNC2447 has exploited a zero-day issue (CVE-2021-20016) in SonicWall Secure Mobile Access (SMA) devices, fix
Publish At:2021-04-30 13:34 | Read:195 | Comments:0 | Tags:Breaking News Cyber Crime Hacking Malware CVE-2021-20016 mal

SonicWall Zero-Day Exploited by Ransomware Group Before It Was Patched

A zero-day vulnerability addressed by SonicWall in its Secure Mobile Access (SMA) appliances earlier this year was exploited by a sophisticated and aggressive cybercrime group before the vendor released a patch, FireEye’s Mandiant unit reported on Thursday.Over the past half a year, a new cybercrime group has been observed using a broad range of malware and
Publish At:2021-04-30 12:15 | Read:182 | Comments:0 | Tags:NEWS & INDUSTRY Virus & Threats Vulnerabilities expl

Exploiting and detecting CVE-2021-25735: Kubernetes validating admission webhook bypass

The CVE-2021-25735 medium-level vulnerability has been found in Kubernetes kube-apiserver that could bypass a Validating Admission Webhook and allow unauthorised node updates. The kube-apiserver affected are: kube-apiserver v1.20.0 to v1.20.5 kube-apiserver v1.19.0 to v1.19.9 kube-apiserver <= v1.18.17 You are only affected by this vulne
Publish At:2021-04-28 09:58 | Read:234 | Comments:0 | Tags:Uncategorized exploit

Apple Patches macOS Security Bypass Vulnerability Exploited by 'Shlayer' Malware

Apple has patched a serious security bypass vulnerability in macOS that has been exploited in the wild by at least one threat group.The tech giant on Monday informed customers that it has patched tens of vulnerabilities in macOS Catalina, Mojave and Big Sur. The Big Sur update fixes nearly 60 security holes, including a logic issue tracked as CVE-2021-30657
Publish At:2021-04-27 09:50 | Read:249 | Comments:0 | Tags:NEWS & INDUSTRY Virus & Threats Virus & Malware

Apple fixes macOS zero-day bug exploited by Shlayer malware

Apple has fixed a zero-day vulnerability in macOS exploited in the wild by Shlayer malware to bypass Apple's File Quarantine, Gatekeeper, and Notarization security checks and download second-stage malicious payloads.Shlayer's creators have managed to get their malicious payloads through Apple's automated notarizing process before. If they pass this
Publish At:2021-04-26 15:54 | Read:174 | Comments:0 | Tags:Security Apple exploit