Executive summary In May 2020, Kaspersky technologies prevented an attack on a South Korean company by a malicious script for Internet Explorer. Closer analysis revealed that the attack used a previously unknown full chain that consisted of two zero-day exploits: a remote code execution exploit for Internet Explorer and an elevation of privilege exploit for…
App concealed the practice of gathering device unique identifiers using an added layer of encryption.
The RAT is surging in 2020, becoming more prevalent than even the infamous TrickBot or Emotet malware.
One of the two zero-day bugs is rated ‘critical’ and is classified as a remote code-execution bug impacting Microsoft’s Internet Explorer.
A critical privilege-escalation flaw affects several popular Intel motherboards, server systems and compute modules.
Adobe patched critical and important-severity flaws tied to 26 CVEs in Acrobat and Reader.
The fundamental causes for the skill gap are myriad, starting with a lack of training and career-development opportunities.
Four critical-severity flaws were recently disclosed in the Find My Mobile feature of Samsung Galaxy smartphones, which if exploited could allow attackers to force a factory reset on the phones or spy on users.
Three separate proof-of-concepts on Bash, Python and Ruby posted to outsmart fix issued last year to remedy pre-auth RCE bug.
Google Home devices reportedly recorded noises even without the “Hey Google” prompt due to the inadvertent rollout of a home security system feature.