Posts for category: Vulnerabilities Weekly Summaries

BlueBorne

The Researchers from Armis have discovered and disclosed 8-zero day vulnerbilities in the current Bluetooth protocol in their very detailed white paper .  Their attacks have been grouped together ...

Siri, Alexa and other AI get Ultrasounds, the result is the Dolphin Attack

Researchers from China's Zhejiang have found an interesting vulnerability in all the major AI smart assistants. They have dubbed their attack framework as DolphinAttack. This attack relies on ...

ROPEMAKER

Francisco Ribeiro is a security researcher for Mimecast which is a company dedicated to email cloud services focusing on security and auditing. Recently a white paper was published by Francisco ...

Hacking With Stickers

Deep Neural Network-based ClassifiersVulnerabilities Researchers from the of Washington have dived deep into the world of Deep Neural Network-Based algorithms and classifiers and have found and ...

PDQ Manufacturing, Inc. LaserWash / Digi, Ludlum, and Mirion

PDQ Manufacturing, Inc. LaserWash, Laser Jet and ProTouch "IoT" or "internet of things" does not just refer to your coffee maker or refrigerator than can post to Facebook or Twitter, but also ...

Devil’s Ivy

Recently researchers at Senrio Inc. in Portland, Or released a proof of concept exploit dubbed Devil's Ivy CVE-2017-9765 that proves once again IoT devices can have severe vulnerabilities. The ...

GMR-2 Satellite Phones / Windows RDP and Relay Attack 0-Day

Windows RDP and Relay Attack Zero-Day The researchers at Preempt, innovators in next gen firewalls discovered 2 different zero-day vulnerabilities in the Windows NTLM security protocols. The ...

Libgcrypt RSA-1024 Cracked / Linux Evil DNS

GnuPG's LibgCrypt RSA-1024 Cracked A team of researchers, from Technical of Eindhoven, the of Illinois, the of Pennsylvania, the of Maryland, and the of Adelaide, have released a white paper  ...

Microsoft Patches and DeltaCharlie

Patch Tuesday has come and gone and with it the final fixes or patches for the many vulnerabilities on the various Windows operating system. Interestingly enough, Microsoft has included the ...

Apache Hadoop Couch Databases

Apache Hadoop databases have been the latest victims to database attacks.  Companies have found that the information stored on these databases have  been wiped with only a calling card left ...