Vulnerability

Widespread Bluetooth Vulnerabilities Uncovered in Major Operating Systems

Marc Newlin, a software engineer at Skysafe, has identified critical vulnerabilities...

Over 700 Smartphone Models at Risk: Researchers Uncover 5G Network Vulnerabilities

A team of researchers from the Singapore University of...

New Security Flaw ‘BLUFFS’ Threatens Encrypted Bluetooth Connections Worldwide

A new set of vulnerabilities known as BLUFFS (Bluetooth...

Researchers Exposed Fingerprint Authentication Flaw in Windows Hello

Researchers at Blackwing Intelligence have identified vulnerabilities in the...

Google’s HTTP/2 Vulnerability Leads to Record-Breaking DDoS Attacks

A recent vulnerability in Google's HTTP/2 protocol has not...

Log4Shell: Log4j Vulnerability Threatens Cybersecurity Worldwide

The recently discovered vulnerability known as Log4Shell is currently causing chaos on the internet, as cyber defenders try to fix the flaw while cybercriminals...

Security Experts Discovered Malware Intended For Windows Subsystem For Linux

Lumen's Black Lotus Labs, which specialize in network security, report on their blog about malware that was written in Python and created as a Linux ELF...

BrakTooth Vulnerabilities In Various Bluetooth SoCs Put Billions Of Devices At Risk

Security researchers at the Singapore University of Technology and Design have found 16 security flaws in commercially used Bluetooth stack implementations, which they summarize under the...

WhatsApp Vulnerability Allowed Attackers To Access Users’ Private Data From The Application Memory

WhatsApp was affected by a security vulnerability that allowed attackers to access users' private data through the application's memory. According to the cybersecurity firm Check Point...

iOS Bug Disables Wi-Fi On iPhones When You Join Hotspot With A Specific Network Name

A new iOS bug has been discovered that completely blocks the Wi-Fi on iPhones if it joins a network with a very specific network...

M1RACLES: Asahi Linux Developer Discovered A Design Flaw In Apple M1 Chip

During reverse engineering for the Linux port, Asahi Linux developer Hector Martin has found a design flaw in the Apple Silicon M1 chip that can be...

Design Flaws In WLAN Protocol Make The Majority Of Devices Vulnerable

With the so-called Fragattacks (Fragmentation and Aggregation Attacks), the security researcher Mathy Vanhoef, known for his work on Krack Attack, has again presented a series of design...

A Flaw in Qualcomm Modem Makes 30% Of Android Phones Vulnerable

The Israeli security firm Check Point Research has discovered a vulnerability in Qualcomm's MSM (Mobile Station Modem) that affects millions of Android phones around...

Spectre Is Back: Side-Channel Attacks On AMD Ryzen And Intel Core Is Possible

It has been three years since the microprocessor industry first had to deal with the existence of the Specter attack. Over time, many variants of Spectre...

Signal Creator Hacked FBI Forensics Tool

After the forensics software manufacturer Cellebrite falsely announced last year that it had figured out a way to access the secure messaging app Signal. It looks...

Hackers Took Advantage Of 11 Zero Days In The Past Year

A particularly threatening group of hackers took advantage of 11 zero-days in the past year, i.e., security gaps that were not known at the...

Hackers Managed To Jailbreak Practically All Modern iPhones

In recent years, the 'jailbreak' has lost importance for many reasons. Apple has pursued this practice and countered it with new versions of iOS...