Menu

Vulnerability

All articles and tutorials tagged #Vulnerability
Hackers can Steal Data by Tweaking Monitors Brightness
Hackers can Steal Data by Tweaking Monitors Brightness

Israeli researchers at Ben-Gurion University detailed a method, dubbed Brightness, to steal data from computers by capturing brightness video changes of the [...]

ScreenCameraBrightnessVulnerabilityAir-GapInvisible
Exploit Shellshock Vulnerability CVE 2014-6271 using Metasploit
Exploit Shellshock Vulnerability CVE 2014-6271 using Metasploit

A recent study from November 2019 shows that the security vulnerability called ShellShock CVE-2014-6271 discovered in 2014 would still be present on a large [...]

BashMetasploitOpenSSHShellshockVulnerability
WhatsApp MP4 Videos Flaw allows Hackers to execute Code Remotely
WhatsApp MP4 Videos Flaw allows Hackers to execute Code Remotely

A new bug on Whatsapp, based on MP4 videos flaws, has been revealed by Facebook. This vulnerability could lead to denial of service attacks or remote code [...]

FacebookWhatsAppFlawVideoVulnerabilityCVEMP4
A variant of Zombieload flaw hits Intel's Newest Cascade Lake Chips
A variant of Zombieload flaw hits Intel's Newest Cascade Lake Chips

After Spectre and Meltdown, another vulnerability affects Intel processors. A variant of the Zombieland attack would target chips under micro-architecture [...]

ZombieloadSpectreMeltdownVulnerabilityFlawAttackXeon
The Bluekeep Exploit is back and is used to install Cryptominer
The Bluekeep Exploit is back and is used to install Cryptominer

Recently one Cyber-Security researcher discovered that the vulnerability BlueKeep was back and was used to install cryptominer remotely on compromised machines.

BlueKeepRDPCryptominerXMRMoneroWindowsVulnerability