searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus
Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Reviews
  • Events
  • Whitepapers
  • Industry news
  • Newsletters
  • (IN)SECURE Magazine

exploit

Get our top stories in your inbox

Medical washer-disinfector appliance’s web server open to attack

March 27, 2017

Here’s a string of words that you probably never thought you’ll hear: An Internet-connected washer-disinfector appliance by German manufacturer Miele sports a …

Hijacking Windows user sessions with built-in command line tools

March 20, 2017

Did you know that by using built-in command line tools, any user with system rights and permissions (usually a local administrator) can hijack the session of any logged-in …

Unpatched flaw opens Ubiquiti Networks devices to compromise

March 17, 2017

A critical vulnerability in many of Ubiquiti Networks’ networking devices can be exploited by attackers to take over control of the device and, if that device acts as a …

By the end of March no one will remember that Microsoft missed a Patch Tuesday

March 13, 2017

Like the weather in Minnesota, the March Patch Forecast is unpredictable at best. Be prepared for turbulent times interspersed with moments of calm. Will March Patch Tuesday …

Apache servers under attack through easily exploitable Struts 2 flaw

March 9, 2017

A critical vulnerability in Apache Struts 2 is being actively and heavily exploited, even though the patch for it has been released on Monday. System administrators are …

Researchers bypass ASLR protection with simple JavaScript code

February 15, 2017

A group of researchers from the Systems and Network Security Group at VU Amsterdam have discovered a way to bypass address space layout randomization (ASLR) protections of …

Tens of thousands WordPress sites defaced, SEO spam to follow

February 8, 2017

Attackers are actively exploiting the recently patched unauthenticated privilege escalation vulnerability in WordPress’ REST API to deface websites. Sucuri, the company …

Exploit for Windows DoS zero-day published, patch out on Tuesday?

February 3, 2017

A zero-day bug affecting Windows 10, 8.1, Windows Server 2012 and 2016 can be exploited to crash a vulnerable system and possibly even to compromise it. The bug It is a memory …

Cisco WebEx extension opens Chrome users to drive-by malware attacks

January 24, 2017

Windows users who have the widely used Cisco WebEx extension installed on Chrome are in danger of getting silently hacked when visiting a malicious website. The vulnerability, …

Shadow Brokers say goodbye, leak a batch of Windows hacking tools

January 13, 2017

The Shadow Brokers, a group (?) of hackers that has made a big splash in August last year by leaking and offering for sale exploits supposedly stolen from the infamous …

Nagios Core 4.2.4 closes serious root privilege escalation bug

December 16, 2016

If you’re using Nagios Core to monitor your systems, networks and infrastructure, and you have not updated to version 4.2.4, you better hop to it. This latest release …

Netgear pushes out beta firmware for vulnerable router models

December 13, 2016

Netgear has confirmed that eight of its router models are vulnerable to device hijacking due to a vulnerability that can be easily exploited by remote, unauthenticated …

Posts navigation

1 … 7 8 9 10 11 12 13 14 15 … 40
arrows

Risky business: 3 timeless approaches to reduce security risk in 2021

  • Security starts with architecture
  • Proliferation of sneakerbots across industries: The long tail of DIY bot operators
March 2021 Patch Tuesday forecast: Off to an early start

What's new

person

Credential exposure trends: You need a better password

arrows

Risky business: 3 timeless approaches to reduce security risk in 2021

patch

March 2021 Patch Tuesday forecast: Off to an early start

stock price

Cybercriminals increasingly impersonate business-related apps

Don't miss

patch

March 2021 Patch Tuesday forecast: Off to an early start

arrows

Risky business: 3 timeless approaches to reduce security risk in 2021

person

Credential exposure trends: You need a better password

stock price

Cybercriminals increasingly impersonate business-related apps

building

Security starts with architecture

Help Net Security - Daily information security news with a focus on enterprise security.
Follow us
  • Features
  • News
  • Expert Analysis
  • Reviews
  • Events
  • Whitepapers
  • Industry news
  • Newsletters
  • Twitter

In case you’ve missed it

  • The economics behind global disinformation engines and strategies for mitigation
  • How do I select a cloud security solution for my business?
  • Chief Legal Officers face mounting compliance, privacy and cybersecurity obligations
  • How do I select a network monitoring solution for my business?

(IN)SECURE Magazine ISSUE 67 (November 2020)

  • Hardware security: Emerging attacks and protection mechanisms
  • Justifying your 2021 cybersecurity budget
  • Cooking up secure code: A foolproof recipe for open source
  • Mapping the motives of insider threats
Read online
© Copyright 1998-2021 by Help Net Security
Read our privacy policy | About us | Advertise