Researcher Releases Jailbreak PoC for iOS 12 on iPhone X

After tinkering with the latest iteration of Apple’s mobile operating system, a Chinese researcher has published a proof-of-concept of what he claims is a working exploit that can jailbreak iOS 12 on an iPhone X – and remotely, at that. Cri… Continue reading Researcher Releases Jailbreak PoC for iOS 12 on iPhone X

Researcher releases PoC for Windows VCF file RCE vulnerability

A vulnerability that exists in the way Windows processes VCard files (.vcf) can be exploited by remote attackers to achieve execute arbitrary code on vulnerable systems, security researcher John Page has shared. What’s a VCard? VCF is a standard … Continue reading Researcher releases PoC for Windows VCF file RCE vulnerability

PoC exploit for Windows Shell RCE released

Here’s one more reason to hurry with the implementation of the latest Microsoft patches: a PoC exploit for a remote code execution vulnerability that can be exploited via Microsoft Edge has been published and can be easily adapted by attackers. A… Continue reading PoC exploit for Windows Shell RCE released

Windows zero-day flaw and PoC unveiled via Twitter

A Windows zero-day local privilege escalation flaw and a Proof-of-Concept exploit for it have been revealed on Monday by someone who goes by SandboxEscaper on Twitter. The user in question deleted the account soon after, but not before sharp-eyed secur… Continue reading Windows zero-day flaw and PoC unveiled via Twitter

PoC exploit for critical Apache Struts flaw found online

The Apache Software Foundation revealed last week the existence of a critical Apache Struts flaw (CVE-2018-11776) similar to the one exploited in the Equifax breach and urged organizations and developers to upgrade their installations to versions 2.3.3… Continue reading PoC exploit for critical Apache Struts flaw found online

Researchers aim to befuddle cybercriminals with defensive WWII fighter pilot trick

Most ethical hackers prefer to lend their services to eliminate potentially harmful bugs. But one team of white hats wants to test the opposite approach to thwarting bad actors – by wasting their time and resources with non-exploitable, intention… Continue reading Researchers aim to befuddle cybercriminals with defensive WWII fighter pilot trick