New RCE vulnerability impacts nearly half of the internet's email servers

New RCE vulnerability impacts nearly half of the internet’s email servers

A critical remote command execution (RCE) security flaw impacts over half of the Internet’s email servers, security researchers from have revealed today. The vulnerability affects…

View More New RCE vulnerability impacts nearly half of the internet’s email servers
Mysterious Hacker Group Eavesdrops On Corporate Email And FTP Traffic

Mysterious Hacker Group Eavesdrops On Corporate Email And FTP Traffic

Since at least early December 2019, a mysterious hacker group has been taking over DrayTek enterprise routers to eavesdrop on FTP and email traffic inside…

View More Mysterious Hacker Group Eavesdrops On Corporate Email And FTP Traffic
New Attack Creates Ghost Taps On Modern Android Smartphones

New Attack Creates Ghost Taps On Modern Android Smartphones

Modern Android smartphones are susceptible to a new type of attack named “Tap ‘n Ghost” that can induce fake finger taps to take unwanted actions.…

View More New Attack Creates Ghost Taps On Modern Android Smartphones
Vulnerability Leaves Container Images Without Passwords

Vulnerability Leaves Container Images Without Passwords

An old vulnerability in Alpine Linux containers has spread and propagated to as much as 20% of the containers on the Docker Store. Nearly one…

View More Vulnerability Leaves Container Images Without Passwords
Computer Researcher Finds Wallet Vulnerability That Gave Same Key to Multiple Users

Computer Researcher Finds Wallet Vulnerability That Gave Same Key to Multiple Users

Online cryptocurrency paper wallet creator WalletGenerator.net previously ran on code that caused private key/public key pairs to be issued to multiple users. The vulnerability was…

View More Computer Researcher Finds Wallet Vulnerability That Gave Same Key to Multiple Users
Critical Magento SQL injection flaw could be targeted by hackers soon

Critical Magento SQL injection flaw could be targeted by hackers soon

The Magento content management system used by thousands of online shops has received fixes for several serious vulnerabilities, including an unauthenticated SQL injection flaw that’s…

View More Critical Magento SQL injection flaw could be targeted by hackers soon
Google fixes no-user-interaction bug in Android's Bluetooth component

Google fixes no-user-interaction bug in Android’s Bluetooth component

Google has patched this week a critical security flaw in Android’s Bluetooth component. If left unpatched, the vulnerability can be exploited without any user interaction…

View More Google fixes no-user-interaction bug in Android’s Bluetooth component
Hackers are hijacking smart building access systems to launch DDoS attacks

Hackers are hijacking smart building access systems to launch DDoS attacks

Hackers are actively searching the internet and hijacking smart door/building access control systems, which they are using to launch DDoS attacks, according to firewall company…

View More Hackers are hijacking smart building access systems to launch DDoS attacks
Cisco Webex Flaw Lets Unauthenticated Users Join Private Online Meetings

Cisco Webex Flaw Lets Unauthenticated Users Join Private Online Meetings

Cisco Systems has fixed a high-severity vulnerability in its popular Webex video conferencing platform, which could let strangers barge in on password-protected meetings – no…

View More Cisco Webex Flaw Lets Unauthenticated Users Join Private Online Meetings
Microsoft warns about Internet Explorer zero-day, but no patch yet

Microsoft warns about Internet Explorer zero-day, but no patch yet

Microsoft has published a security advisory today about an Internet Explorer (IE) vulnerability that is currently being exploited in the wild — a so-called zero-day.…

View More Microsoft warns about Internet Explorer zero-day, but no patch yet