Article on the subject of "zero-day vulnerabilities"
-
Microsoft Outlook RCE Vulnerability Can Sell For $400,000
if you discover a remote arbitrary code execution vulnerability affecting microsoft outlook, you can sell it for up to $ 400,000.
-
The new zero-day vulnerability on Windows 10 helps hackers take control of the computer
this is a serious security vulnerability that could allow hackers to attack and gain control of computer devices.
-
There is a new zero-day vulnerability in Windows
the vulnerability posted on twitter and on github also has a poc that demonstrates one of the ways this error exploits the machine, making it impossible to boot.
-
Detecting zero-day vulnerabilities in Internet Explorer helps hackers gain control of the computer
the research team from qihoo 360's security unit discovered a zero-day vulnerability (the term refers to unpublished or unresolved vulnerabilities) on internet explorer.
-
The Mail app on iOS has serious vulnerabilities
security researchers at zecops have discovered two serious vulnerabilities that exist on the default mail application pre-installed on millions of iphones and ipads.
-
Microsoft expert discovered a series of serious code execution errors in IoT, OT devices
microsoft security researchers announced that they discovered more than two dozen serious remote code execution (rce) vulnerabilities related to internet of things (iot) and operational technology (ot) devices being used. relatively popular use today.
-
New dangerous vulnerability in Intel CPU: Works like Specter and Meltdown, threatening all PCs and the cloud
an extremely serious new class of intel chip vulnerabilities has been discovered by security researchers at graz university of technology, if successful exploitation of the bad guys can take advantage of it to steal sensitive information online. next from the processor.
-
HP publishes a series of critical vulnerabilities in the Teradici PCoIP protocol
hp has warned of serious security vulnerabilities in the teradici pcoip client and agent for windows, linux, and macos. these vulnerabilities affect 15 million endpoints.
-
Security vulnerabilities - basic insights
software vulnerabilities can be interpreted as a malfunction or weakness in software or operating systems. with the development of new attack technologies, the severity of software vulnerabilities is growing exponentially.
-
Microsoft rewards $ 250,000 for any talent that discovers the new Meltdown and Specter vulnerabilities
in the effort to protect users from meltdown and specter vulnerabilities, microsoft has decided to launch a 'bounty hunt' program with extremely lucrative expenses for anyone who finds new security flaws. and reveal them to microsoft.
-
Release software to check DNS server vulnerabilities
according to bach khoa network security center (bkis), dns cache poisoning vulnerabilities are placing dns server systems in vietnam as well as worldwide.
-
EternalRocks - more dangerous malicious code than WannaCry exploits up to seven NSA vulnerabilities
while ransomware wannacry has stirred up the internet world over the past few weeks to exploit only two vulnerabilities, the new malware uses seven vulnerabilities.
-
Four Windows vulnerabilities can be exploited in the perfect attack chain
the vulnerabilities include: 2 remote code execution errors, 1 privilege escalation error and 1 secure boot security feature bypass error. under ideal conditions, hackers can combine 4 vulnerabilities to form a perfect attack chain.
-
There is a new zero-day vulnerability in Windows
the vulnerability posted on twitter and on github also has a poc that demonstrates one of the ways this error exploits the machine, making it impossible to boot.
-
Detecting zero-day vulnerabilities in Internet Explorer helps hackers gain control of the computer
the research team from qihoo 360's security unit discovered a zero-day vulnerability (the term refers to unpublished or unresolved vulnerabilities) on internet explorer.
-
Vulnerabilities discovered in many web browsers that allow users to be tracked through installed applications
international security researchers have recently developed a method, or rather, a rather dangerous new vulnerability on many popular web browsers.
-
Many serious vulnerabilities have been discovered that allow attackers to take full control of the 4G router
in the past few months, security experts around the world have found that many vulnerabilities exist in 4g routers.
-
Intel's chip has eight new serious vulnerabilities
several weeks ago, google project zero security experts discovered eight new vulnerabilities in intel's chip design, which could directly lead to specter and meltdown, two vulnerabilities that negatively impacted performance. whole computer system.
-
Foreshadow - the fifth most serious security hole in the CPU in 2018
this vulnerability could bypass intel sgx security measures. what a tiring year for microprocessors, especially intel.
-
5 common errors in managing security vulnerabilities
in the eyes of some people the issue of managing vulnerabilities is considered one of the intensive security management activities. there are others who think this is just a necessary process that microsoft has to make
-
Find security holes on every site with Nikto
there are several tools and applications to find security vulnerabilities in web pages, but one of the simplest tools is nikto. this article will show you how to use nikto to check security holes on every site!
-
Detecting an extremely dangerous vulnerability on nearly 16,000 iOS applications
apps with high download volume and users of over 100 million people like instagram, amazon, twitter and dropbox are likely to be affected.
-
Detects 'long-standing' security vulnerabilities in Microsoft Office
security firm bkav on july 22 has warned that a microsoft office vulnerability has been quietly exploited since 2009.
-
If you hack HP's printer, you will receive $ 10,000
hp is offering a printer-specific vulnerability program, whereby any researcher who discovers vulnerabilities that allow hackers to take control of the company's printer will be rewarded with $ 10,000.