Wormable Apple iCloud Bug Allows Automatic Photo Theft

Ethical hackers so far have earned nearly $300K in payouts from the Apple bug-bounty program for discovering 55 bugs, 11 of them critical, during a three-month hack. Continue reading Wormable Apple iCloud Bug Allows Automatic Photo Theft

Salt Bugs Allow Full RCE as Root on Cloud Servers

Researchers say the bugs are easy to exploit and will likely be weaponized within a day. Continue reading Salt Bugs Allow Full RCE as Root on Cloud Servers

Flaw in Elementor and Beaver Addons Let Anyone Hack WordPress Sites

Attention WordPress users!

Your website could easily get hacked if you are using “Ultimate Addons for Beaver Builder,” or “Ultimate Addons for Elementor” and haven’t recently updated them to the latest available versions.

Security researchers have di… Continue reading Flaw in Elementor and Beaver Addons Let Anyone Hack WordPress Sites

Severe Auth Bypass and Priv-Esc Vulnerabilities Disclosed in OpenBSD

OpenBSD, an open-source operating system built with security in mind, has been found vulnerable to four new high-severity security vulnerabilities, one of which is an old-school type authentication bypass vulnerability in BSD Auth framework.

The other… Continue reading Severe Auth Bypass and Priv-Esc Vulnerabilities Disclosed in OpenBSD

Galaxy S10 Fingerprint Sensor Thwarted With Screen Protector: Report

A U.K. woman alleged that her husband was able to bypass her Samsung Galaxy S10 smartphone’s fingerprint reader when the phone was encased by a third-party screen protector. Continue reading Galaxy S10 Fingerprint Sensor Thwarted With Screen Protector: Report

‘USBAnywhere’ Bugs Open Supermicro Servers to Remote Attackers

Trivial-to-exploit authentication flaws can give an unsophisticated remote attacker ‘omnipotent’ control over a server and its contents. Continue reading ‘USBAnywhere’ Bugs Open Supermicro Servers to Remote Attackers