Smashing Security podcast #212: Dutch leaks, Peeping Toms, and researchers under fire

Google warns security researchers that North Korean hackers are pretending to be their buddies, sensitive information connected to Coronavirus testing is available for sale in the Netherlands, and is a Peeping Tom at your home security provider spying … Continue reading Smashing Security podcast #212: Dutch leaks, Peeping Toms, and researchers under fire

Update your iPhone now to protect against vulnerabilities that hackers may have actively exploited

Apple is encouraging owners of iPhones and iPads to update their devices to the latest version of iOS and iPadOS in order to protect against serious vulnerabilities that could have already been actively exploited by malicious hackers. Continue reading Update your iPhone now to protect against vulnerabilities that hackers may have actively exploited

North Korean hackers attempt to hack security researchers investigating zero-day vulnerabilities

Threat experts at Google say that they have identified an ongoing hacking campaign that has targeted computer security experts, specifically those researching the very type of software vulnerabilities exploited by cybercriminals.

Read more in my art… Continue reading North Korean hackers attempt to hack security researchers investigating zero-day vulnerabilities

Apple fixes three actively exploited iOS zero-days

Apple has release a new batch of security updates and has fixed three iOS zero-days that “may have been actively exploited” by attackers. The three zero-days Two of the zero-day vulnerabilities (CVE-2021-1870 and CVE-2021-1871) are logic is… Continue reading Apple fixes three actively exploited iOS zero-days

Sudo vulnerability allows attackers to gain root privileges on Linux systems (CVE-2021-3156)

A vulnerability (CVE-2021-3156) in sudo, a powerful and near-ubiquitous open-source utility used on major Linux and Unix-like operating systems, could allow any unprivileged local user to gain root privileges on a vulnerable host (without authenticatio… Continue reading Sudo vulnerability allows attackers to gain root privileges on Linux systems (CVE-2021-3156)

TikTok vulnerability allowed hackers to access users’ phone numbers

By Waqas
The vulnerability which has now been fixed by TikTok existed in its “Find Friends.”
This is a post from HackRead.com Read the original post: TikTok vulnerability allowed hackers to access users’ phone numbers
Continue reading TikTok vulnerability allowed hackers to access users’ phone numbers

Cybersecurity investments will increase up to 10% in 2021

A Canalys forecast predicts cybersecurity investments will increase 10% worldwide in the best-case scenario in 2021. Information security will remain a high priority this year, as the range of threats broadens and new vulnerabilities emerge, while the … Continue reading Cybersecurity investments will increase up to 10% in 2021

How secure configurations meet consensus

Have you ever wondered how technology hardening guidelines are developed? Some are determined by a particular vendor or driven by a bottom-line perspective. But that’s not the case with CIS Benchmarks. They’re developed by the Center for Internet Secur… Continue reading How secure configurations meet consensus