MITM

Electron Windows Protocol Handler MITM/RCE (bypass for CVE-2018-1000006 fix)

As part of an engagement for one of our clients, we analyzed the patch for the recent Electron Windows Protocol handler…

6 years ago

Are you a Tinder user? Watch out, someone could spy on you

Experts at security firm Checkmarx discovered two security vulnerabilities in the Tinder mobile apps that could be exploited to spy…

6 years ago

The cybersecurity firm Fox-IT disclosed a security breach that affected its infrastructure

For Fox-IT disclosed a security breach that affected its infrastructure and demonstrated how to manage it in an outstanding way.…

6 years ago

Microsoft accidentally exposed Dynamics 365 TLS certificates exposing sandbox environments to MiTM attacks

Microsoft accidentally exposed a Dynamics 365 TLS certificate and private key for at least 100 days leaving the sandbox environments…

6 years ago

Major Banking Applications were found vulnerable to MiTM attacks over SSL

Security experts discovered a critical vulnerability in major mobile banking applications that left banking credentials vulnerable to hackers. A group…

6 years ago

Microsoft’s October Patch Tuesday addresses critical Windows DNS client Zero-Day Flaws tied to DNSSEC

Microsoft's October Patch Tuesday addresses three critical zero-day security vulnerabilities tied to the DNSSEC protocol. Microsoft's October Patch Tuesday addresses three critical…

7 years ago

Billions of mobile, desktop and IoT devices potentially exposed to BlueBorne Attack

Billions of mobile, desktop and IoT devices that use Bluetooth may be exposed to a new stealthy remote attack dubbed…

7 years ago

Perl devs fix an important flaw in DBD—MySQL that affects encryption between client and server

Perl development team solved a flaw in DBD—MySQL in some configurations that wasn't enforcing encryption allowing an attacker to power…

7 years ago

iCloud Keychain vulnerability allowed hackers to Steal sensitive data

Apple has recently fixed an iCloud Keychain vulnerability that could have been exploited by hackers to steal sensitive data from…

7 years ago

Security vulnerabilities in Hyundai Blue Link mobile app allowed hackers to steal vehicles

Security vulnerabilities in the Hyundai Blue Link mobile apps allowed hackers to steal vehicles, the car maker fixed them. Security…

7 years ago

This website uses cookies.