The security breach labeled CVSS 10.0, the highest possible dangerousness score, would allow the cybercriminal to perform malicious DNS (domain name system) queries to the Windows server, and to achieve arbitrary code execution that could offer full control over all the IT infrastructure of a…
Read More...
Browsing Tag
vulnerability
ECB to present in July results on bank vulnerability
The European Central Bank (ECB) is confident that it will be able to publicly discuss "at the end of July" the results of the test it is carrying out to assess the vulnerability of European banks to the potential impact on their balance…
Vulnerability in Teams allows data theft
A critical vulnerability in the collaborative professional application Microsoft Teams exposes users to data theft and ransonware attacks through the use of malicious GIF image files.
The security flaw is present in the Teams desktop and…
United Kingdom will present the first regulated digital currency bank
In the United Kingdom, the first regulated digital currency bank will be established with the aim of giving users the best experience of being part of the industry and services of this new financial modality.
This was reported by Mark…
US technology giants close 2019 with historical maximum
The main technology companies in the US are about to close 2019 with historical highs after the record of eleven days with green closures, mainly stimulated by Apple and Microsoft.
After spending a year marked with commercial tensions…
WhatsApp vulnerability allows hackers to block the application
The cybersecurity company Check Point discovered a critical vulnerability in WhatsApp that allows cybercriminals to block the app and prevent users from using it by sending a malicious message to a group chat and blocking the application to…
Microsft is on alert for attacks increase
Microsoft alerted the community about the growth of BlueKeep vulnerability attacks, which take advantage of a failure in the Remote Desktop Protocol (RDP). It allows the connection between two computers with Windows system with the…
Cybercriminals hack accounts of Venezuelans who have crypto assets
The rise of bitcoin and the main cryptocurrencies attached to a platform that allows to store value and acquire it both in goods and services, in countries with strong financial problems. Given this reality, customers look for mechanisms…
SIM cards are vulnerable to SIMjacker attacks
SIM cards minimum level of protection set to zero puts mobiles security at risk and makes them vulnerable to attacks by SIMjacker and the recently discovered WIBattack.
SIM cards are vulnerable to a second type of cyber attack that…
Blockchain security system of upcoming Moscow elections is violated
Pierrick Gaudry, a professor at the University of Lorraine and a member of the French Research Institute INRIA, achieved a vulnerability in the voting system based on ethereum crypto technology that will be implemented in the next elections…
Google Nest Cam IQ presents security flaws
The Google indoor camera was created with the intention of providing users with a means to protect their home from anywhere. Thanks to it, it is possible to have a complete surveillance of any point of the house.
However, a equipment that…
Apple solves the safety issue generated by Zoom
Apple released a software update for their Mac computers that removes the vulnerable component of Zoom videoconferencing application, which allowed free access to the camera of another device without permission.
This was confirmed by the…