exploit

7 Articles
A critical Erlang/OTP security flaw is “surprisingly easy” to exploit, experts warn – so patch now
Tech

A critical Erlang/OTP security flaw is “surprisingly easy” to exploit, experts warn – so patch now

Security researchers find a 10/10 flaw in Erlang/OTP SSH Horizon3 Attack Team says the flaw is “surprisingly easy” to exploit A patch is...

Hackers could exploit genomic data vulnerabilities
Tech

Hackers could exploit genomic data vulnerabilities

Credit: Pixabay/CC0 Public Domain Next-generation DNA sequencing (NGS)—the same technology which is powering the development of tailor-made medicines, cancer diagnostics, infectious disease tracking,...

Hackers exploit zero-day Common Log File System vulnerability to plant ransomware
Tech

Hackers exploit zero-day Common Log File System vulnerability to plant ransomware

Microsoft said it observed a threat actor known as Storm-2460 abuse a use after free flaw in Windows Common Log File System Driver...

Hackers are targeting unpatched ServiceNow instances that exploit 3 separate year-old vulnerabilities
Tech

Hackers are targeting unpatched ServiceNow instances that exploit 3 separate year-old vulnerabilities

ServiceNow fixed three flaws in July 2024, but researchers from GreyNoise saw a resurgence of abuse The flaws can be used for full...

This Find My exploit lets hackers track any Bluetooth device – here’s how you can stay safe
Tech

This Find My exploit lets hackers track any Bluetooth device – here’s how you can stay safe

A new exploit can track any Bluetooth device using Apple’s Find My network The attack can be done remotely in just a few...

Modeling adversarial intelligence to exploit AI’s security vulnerabilities
Tech

Modeling adversarial intelligence to exploit AI’s security vulnerabilities

“With my team, I design AI-enabled cyber attackers that can do what threat actors do,” says O’Reilly. “We invent AI to give our...

Scammers exploit tiny typos to trick people into sending money to their crypto wallets
Tech

Scammers exploit tiny typos to trick people into sending money to their crypto wallets

Attackers can “surround” benign Web3 domains in order to capitalize from typos. Unlike traditional domain squatting, a single typo can result in the...