Friday , October 18 2024

Vulnerabilities

Samsung mobile devices 25 flaws patched

Samsung

Samsung has patched 25 vulnerabilities in its mobile devices. This is to strengthen them against code execution and privilege escalation attacks. Samsung is continuously working to improve the security of its smartphones and tablets, protecting the safety and privacy of its users. Samsung recently disclosed vulnerabilities, known as Samsung Vulnerabilities …

Read More »

Outpost24 report
Cybersecurity Loopholes in Paris 2024 Olympics Infrastructure

Paris

The 2024 Olympic Games in Paris are coming soon. A recent cybersecurity assessment by Outpost24, a provider of cyber threat exposure management solutions, has raised concerns about the online infrastructure of the games. Outpost24 has identified critical vulnerabilities in the security posture, despite it being considered “mostly secure”. These vulnerabilities …

Read More »

Xiaomi Android Devices Hit by Multiple Flaws

Xaomi

Researchers found multiple vulnerabilities in various applications and system components on Xiaomi devices. “The vulnerabilities in Xiaomi led to access to arbitrary activities, receivers and services with system privileges, theft of arbitrary files with system privileges, [and] disclosure of phone, settings and Xiaomi account data,” The Hacker News report reads. …

Read More »

CISA
GitLab account takeover bug is actively exploited in attacks

Gitlab

The U.S. federal agency CISA has included CVE-2023-7028 in its Known Exploited Vulnerabilities Catalog. This means that the vulnerability is currently being targeted by attackers. CISA has instructed federal agencies to protect their systems by May 22, giving them a deadline of three weeks. The U.S. cybersecurity agency hasn’t shared …

Read More »

SafeBreach security research
Experts Uncover Windows Flaws Granting Hackers Rootkit-Like Powers

flow

According to a new research bad actors could exploit the DOS-to-NT path conversion process to hide and impersonate files, directories, and processes, gaining rootkit-like capabilities. “When a user executes a function that has a path argument in Windows, the DOS path at which the file or folder exists is converted …

Read More »