Category: vulnerability

Google, Cisco and VMware join Microsoft to oppose NSO Group in WhatsApp spyware case

A coalition of companies have filed an amicus brief in support of a legal case brought by WhatsApp against Israeli intelligence firm NSO Group, accusing the company of using an undisclosed vulnerability in the messaging app to hack into at least 1,400 devices, some of which were owned by journalists and…

Read More

iPhone security flaw let spies hack dozens of Al Jazeera journalists

Journalists appear to have fallen prone to a particularly sophisticated digital espionage campaign. According to the Guardian, Citizen Lab has discovered that operators using NSO Group software, nicknamed Kismet, hacked the iPhones of 37 journalists… Source

Read More

Grindr flaw allowed hijacking accounts with just an email address

A Grindr vulnerability allowed anyone who knows a user’s email address to easily reset their password and hijack their account. All a bad actor needed to do was type in a user’s email address in the password reset page and then pop open the dev tools… Source

Read More

Homeland Security warns of a ‘critical’ security flaw in Windows servers

The US government has a major server security headache on its hands. Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) has delivered a rare emergency directive (via TechCrunch) urging government agencies to install a patch f… Source

Read More

Google Drive flaw may let attackers fool you into installing malware

Google Drive may have a way for hackers to trick you into installing rogue code. System administrator A. Nikoci has told The Hacker News about a flaw in Drive’s “manage versions” feature that could let attackers swap a legitimate file with malware. T… Source

Read More

Microsoft is patching a dangerous Windows DNS Server exploit

Security researchers have discovered a serious flaw in Windows’ Domain Name System software that users must patch immediately. Sagi Tzaik from Check Point found a way to run malicious code which can be used to hijack websites, intercept emails, steal… Source

Read More