Critical Vulnerabilities for Adobe Patched
Adobe today released updates for four of its widely used software—including Adobe Acrobat and Reader, Photoshop CC, ColdFusion, and Brackets—to patch a total of 25 new security vulnerabilities. The software update for Adobe Acrobat and Reader for…
Ransomeware uses Windows Safe Mode to Bypass Antivirus
Cybersecurity researchers have spotted new ransomware that first reboots infected Windows computers into Safe Mode and only then encrypts victims’ files to avoid antivirus detection. Snatch has been active since at least the summer of…
$5 Million Bounty Placed on Russian Hackers Behind Dridex Malware
The United States Department of Justice today disclosed the identities of two Russian hackers and charged them for developing and distributing the Dridex banking Trojan using which the duo stole more than $100 million over…
Linux Bug Lets You Hijack Encrypted VPN Connections
Cybersecurity researchers have disclosed a new severe vulnerability affecting most Linux and Unix-like operating systems, including FreeBSD, OpenBSD, macOS, iOS, and Android, that could allow remote ‘network adjacent attackers’ to spy on and tamper with…
Chrome 0-day Under Active Attacks
With the release of Chrome 78.0.3904.87, Google is warning millions of users to install an urgent software update immediately to patch two high severity vulnerabilities, one of which attackers are actively exploiting in the wild…
UNIX Co-Founder Ken Thompson’s BSD Password Has Been Cracked
In 2014, developer Leah Neukirchen spotted an interesting “/etc/passwd” file in a publicly available source tree of historian BSD version 3, which includes hashed passwords belonging to more than two dozens Unix luminaries who worked…
iTerm2 macOS Critical RCE Flaw Discovered
Tracked as CVE-2019-9535, the vulnerability in iTerm2 was discovered as part of an independent security audit funded by the Mozilla Open Source Support Program (MOSS) and conducted by cybersecurity firm Radically Open Security (ROS). The…
Unpatchable Jailbreak Released For All iOS Devices
Dubbed Checkm8, the exploit leverages unpatchable security weaknesses in Apple’s Bootrom (SecureROM), the first significant code that runs on an iPhone while booting, which, if exploited, provides greater system-level access. “EPIC JAILBREAK: Introducing checkm8 (read…