Vulnerability in Azure Functions allows an attacker to escape to the Docker host – SiliconANGLE

Vulnerability in Azure Functions allows an attacker to escape to the Docker host. Read more at…

Google researcher discovers new iOS security system | ZDNet

iOS 14 shipped with BlastDoor, a new sandbox system for processing iMessages data. Read more at…

10-years-old Sudo bug lets Linux users gain root-level access | ZDNet

The vulnerability, named “Baron Samedit,” impacts most Linux distributions today. Read more at ZDNet…

DDoSers are abusing Microsoft RDP to make attacks more powerful

DDoS amplification attacks have abused all kinds of legit services. Now, it’s Windows. Read more at…

Bitcoin falls 11% after report suggests a critical flaw in the cryptocurrency called ‘double spend’ may have occurred

A report from bitmex research suggested ‘double spend’ had occurred in the bitcoin blockchain – the…

AI Technology Will Replace Humans In the Feild of Cybersecurity By 2030

As Artificial Intelligence (AI) becomes all-pervasive, a new report has forecast that technology would replace humans…

Windows 10 bug corrupts your hard drive on seeing this file’s icon

An unpatched zero-day in Microsoft Windows 10 allows attackers to corrupt an NTFS-formatted hard drive with…

Backdoor account discovered in more than 100,000 Zyxel firewalls, VPN gateways | ZDNet

The username and password (zyfwp/PrOw!aN_fXp) were visible in one of the Zyxel firmware binaries. Read more…

‘A moment of reckoning’: Microsoft’s president sounds a dire warning after the SolarWinds cyberattack

Brad Smith called for a global response to what he described as a threat to critical…

Facebook tracks ‘OceanLotus’ hackers to IT firm in Vietnam

Cybersecurity investigators at Facebook have traced a hacking group long suspected of spying on behalf of…

iPhone zero-click Wi-Fi exploit is one of the most breathtaking hacks ever

Before Apple patch, Wi-Fi packets could steal photos. No interaction needed. Over the air. Read more…

A Bluetooth attack can steal a Tesla Model X in 90 seconds

Tesla is introducing a patch for the vulnerabilities after a researcher demonstrated problems in the car’s…

Security researcher accidentally discovers Windows 7 and Windows Server 2008 zero-day | ZDNet

The vulnerability was discovered while the security researcher was working on a Windows security tool. Read…

LidarPhone attack converts smart vacuums into microphones | ZDNet

LidarPhone attack works by converting a smart vacuum’s LiDAR navigational component into a laser microphone. Read…

New tool automates phishing attacks that bypass 2FA | ZDNet

Trust in two-factor authentication has slowly eroded in the last month after release of Amnesty International…

Jailbreak iPhone 12 Pro under iOS 14.2 successfully completed – Galus Australis

Jailbreaking the iPhone 12 Pro on iOS 14.2 is already a reality. It’s the work of…

CERT/CC launches Twitter bot to give security bugs random names | ZDNet

CERT/CC attempts to reduce the use of sensationalized vulnerability names that needlessly scare software users. Read…

samyk/slipstream

NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine,…

It’s 2020 and a rogue ICMPv6 network packet can pwn your Microsoft Windows machine

Redmond urges folks to apply update ASAP – plus more fixes for Outlook and software from…

The Nvidia Geforce RTX 3090 is very good at cracking passwords and that’s bad news

Yet another reason to use strong, complex passwords Read more at TechRadar…