31 Ago

Attackers Can Remotely Disable Fortress Wi-Fi Home Security AlarmsThe Hacker News

New vulnerabilities have been discovered in Fortress S03 Wi-Fi Home Security System that could be potentially abused by a malicious party to gain unauthorized access with an aim to alter system behavior, including disarming the devices without the victim's knowledge. The...

By

Commenti disabilitati su Attackers Can Remotely Disable Fortress Wi-Fi Home Security AlarmsThe Hacker News Read More
31 Ago

CISA Adds Single-Factor Authentication to the List of Bad PracticesThe Hacker News

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added single-factor authentication to the short list of "exceptionally risky" cybersecurity practices that could expose critical infrastructure as well as government and the private sector entities to devastating cyberattacks. Single-factor authentication is a method of...

By

Commenti disabilitati su CISA Adds Single-Factor Authentication to the List of Bad PracticesThe Hacker News Read More
31 Ago

New Microsoft Exchange 'ProxyToken' Flaw Lets Attackers Reconfigure MailboxesThe Hacker News

Details have emerged about a now-patched security vulnerability impacting Microsoft Exchange Server that could be weaponized by an unauthenticated attacker to modify server configurations, thus leading to the disclosure of Personally Identifiable Information (PII). The issue, tracked as CVE-2021-33766 (CVSS score: 7.3) and...

By

Commenti disabilitati su New Microsoft Exchange ‘ProxyToken’ Flaw Lets Attackers Reconfigure MailboxesThe Hacker News Read More
31 Ago

How Does MTA-STS Improve Your Email Security?The Hacker News

Simple Mail Transfer Protocol or SMTP has easily exploitable security loopholes. Email routing protocols were designed in a time when cryptographic technology was at a nascent stage (e.g., the de-facto protocol for email transfer, SMTP, is nearly 40 years old...

By

Commenti disabilitati su How Does MTA-STS Improve Your Email Security?The Hacker News Read More
30 Ago

LockFile Ransomware Bypasses Protection Using Intermittent File EncryptionThe Hacker News

A new ransomware family that emerged last month comes with its own bag of tricks to bypass ransomware protection by leveraging a novel technique called "intermittent encryption." Called LockFile, the operators of the ransomware have been found exploiting recently disclosed flaws such...

By

Commenti disabilitati su LockFile Ransomware Bypasses Protection Using Intermittent File EncryptionThe Hacker News Read More