Posts for category: Vulnerability Research

Snapd vulnerability allows for privilege escalation on popular Linux distributions

On February 13, 2019 security researcher Chris Moberly from The Missing Link disclosed a privilege escalation possibility within the snapd service that allowed for a local user to elevate privileges ...

Popular RDP client vulnerabilities allows a remote system to be compromised

On February 5, 2019 researchers at Check Point Research disclosed 25 vulnerabilities in 3 popular Remote Desktop Protocol (RDP) clients: mstsc.exe, FreeRDP, and rdesktop. These vulnerabilities ...

iPhone vulnerability allows attackers to spy on contacts

On January 28, 2019, security engineer Brandon Arvanaghi discovered a flaw in the iPhone that allowed for an attacker to receive audio and video feed from another iPhone victim when initiating a ...

GitHub vulnerability threatens intellectual property of users

A recent vulnerability was found by GitHub user sarazasara that allows users to view private code repositories (repos) after they have been revoked privileges from the repo. GitHub is a Web-hosting ...

Google search vulnerability allows forging of faulty Google search links

On January 7, 2019 cybersecurity professional Wietze Beukema reported a vulnerability in the Knowledge Graph of the Google search which allowed for the crafting of Google search uniform resource ...

Did China secretly install microchips to spy on U.S. companies?

What happened?Bloomberg reports that San Jose based company Supermicro implanted microchips on server motherboards.  Over 30 U.S. companies were reported to be affected, including ...

Bug allows address spoofing in Edge and Safari browsers

[caption id="attachment_7964" align="aligncenter" width="500"] Image Source: https://www.2-spyware.com/safari-and-edge-browsers-infected-by-a-spoofing-bug[/caption] A vulnerability that allows ...

#1 Utility in the Mac App Store sends stolen user data to server in China

The top paid utility app in the MacOS App Store named Adware Doctor, was found to be stealing the browsing history of its users and sending the data back to a remote server in China.  The app ...

Vulnerability Write up – Yokogawa Stardom

[pdf-embedder url="https://westoahu.hawaii.edu/cyber/wp-content/uploads/2018/09/03-Vulnerbility-Writeup-Yokogawa-Stardom-Draft-01.pdf" title="03 Vulnerbility Writeup - Yokogawa Stardom - Draft ...

Roaming Mantis Campaign

What happened? A new cyber campaign involving poorly configured and vulnerable routers was exploited to infect several thousand Android smartphones. The malware dubbed “Roaming Mantis” infects ...