Home » Knowledgebase

Knowledgebase

Vulnerabilities in some D-Link and Comba routers reveal credentials in format of plain text

Vulnerabilities in D-Link and Comba Routers

Trustwave specialists discovered a number of vulnerabilities in D-Link and Comba Telecom routers. Bugs allow extracting data from Internet providers and access passwords from devices without authentication. After examining the D-Link DSL-2875AL router, the researchers found out that it is affected by the same problem that other devices of the manufacturer are vulnerable to: they give access to all router …

Read More »

Researchers discover second critical vulnerability in Exim servers in two months

Second Exim Critical Vulnerability

The second critical vulnerability has been discovered in the popular Exim mail server software that allows remote code execution and access to a system with superuser privileges. An open source contributor and security researcher with online nick Zerons discovered the vulnerability that later was analyzed by cybersecurity experts at Qualys. A fix for the vulnerability, as well as a detailed …

Read More »

Another 0-day vulnerability discovered in Android

Android 0-day Vulnerability

Participants in the Google project Zero Day Initiative (ZDI) published details of a 0-day vulnerability that could allow local privilege escalation in Android. According to the description in the ZDI blog, a dangerous vulnerability is present in the v4l2 driver (Video4Linux 2), which provides the possibility of audio and video capture for a Linux family of OS. As it turned …

Read More »

Zerodium first rated exploits for Android more expensive than for iOS

Android more expensive than iOS

The well-known vulnerability broker, Zerodium, has updated its price list, and now for the first time in history exploits for Android are more expensive than exploits for iOS. IS researchers have the opportunity to earn on 0-day bugs for Android, the operation of which does not require user’s interaction, up to $2,500,000. Similar exploits for iOS cost $2,000,000. Thus, Zerodium …

Read More »

In free Bitdefender antivirus fixed vulnerability, which led to escalation of privileges

Vulnerability in Free Bitdefender Antivirus

SafeBreach specialists discovered a vulnerability in the free antivirus Bitdefender Antivirus Free 2020 (up to version 1.0.15.138 that fixes the problem). The bug received the identifier CVE-2019-15295 and scored 5.9 points on the CVSS vulnerability rating scale. The vulnerability could be used by attackers to elevate privileges to the SYSTEM level. The problem is related to the lack of proper …

Read More »

Vulnerability in Trend Micro Password Manager endangers Windows users

Vulnerability in Trend Micro

SafeBreach researchers found a vulnerability in the Trend Micro Password Manager. Using this security issue, an attacker can strengthen his presence in an attacked Windows system. The attack vector exists due to the fact that the Trend Micro Password Manager Central Control Service (PwmSvc.exe file) is launched with the rights of the most privileged Windows account – NT Authority\System. “This …

Read More »

Researchers introduced a system for assessing the probability of exploiting vulnerabilities in real attacks

Exploit Prediction Scoring System

As you probably know, all systems are vulnerable. Annually, CVE identifiers are assigned to thousands of discovered vulnerabilities, and it’s almost impossible to monitor every new one. Exploit Prediction Scoring System maybe solve these problems How to understand which companies correct immediately, and which ones can be put on hold, specialists tried to figure out at the Black Hat USA …

Read More »

Researchers estimate that 1.2 billion of Apple’s devices are not protected from MitM attacks

AWDL vulnerability in Apple devices

Researchers at Darmstadt Technical University claim that the Apple Wireless Direct Link Protocol (AWDL) contains vulnerabilities that endangers more than 1.2 billion devices. Using these gaps, an attacker can track users, disable devices, or intercept files transferred between devices (man-in-the-middle, MitM). Experts from Darmstadt Technical University began analyzing the Apple Wireless Direct Link protocol last year. Though Apple launched AWDL …

Read More »

Vulnerability in ProFTPD allows coping files without permission and executing arbitrary code

ProFTPD servers are vulnerable

German researcher Tobias Mädel discovered that, under certain conditions, ProFTPD servers are vulnerable to remote code execution and information disclosure attacks. The root of the problem lies in the mod_copy module bug, which allows arbitrary files copying. Most often, this module is enabled by default. “All versions of ProFTPd up to and including 1.3.6 (the problem extends to 1.3.6 only …

Read More »

On GitHub published a detailed analysis of BlueKeep vulnerability that simplifies creation of exploits

As part of the May “Tuesday updates”, Microsoft fixed the critical vulnerability CVE-2019-0708 (also known as BlueKeep) related to the operation of Remote Desktop Services (RDS) and RDP. Although the technical details of the problem were not disclosed due to its high level of threat, it is known that with the help of this bug attackers can execute arbitrary code …

Read More »

How to restore default (factory) settings of your computer

Laptop default settings

Many producers of PCs, laptops and netbooks install hidden folders with OS and initial settings, programs and drivers for restoration of system in case of crash. Unexperienced user can delete unnecessary system files, turn on wrong services, computer can be infected with viruses. Hidden folder can occupy about 10-15 Gb and is not visible in Windows Explorer. User can check …

Read More »

How to ban access to certain websites from your computer (Windows)

Reasons for blocking certain websites on computer can be different. In the office or at work system administrators can prohibit access to social networks or entertaining platforms. At home parents can also ban popular game services. Moreover, with excluding usage of suspicious websites, you can protect computer from malware. Simple and fast way to forbid opening website is making changes …

Read More »

Trojan Virus and Latest threats

In computer sciences, Trojan refers to the virus or malware that injects the computer from behind and hides itself by attaching to a file. The sole purpose of inducing Trojan into a system is to leak private information of the user to a third party through a backdoor. Trojan is used to refer to an enemy that attacks from behind …

Read More »

Can antivirus remove malware?

Seeing that computers are a necessity in every household, office and business. Their security and protection becomes the first priority. No one wants to get their PC infected and risk losing everything they have worked so hard for. With everything on our PC, we are on a constant threats of being affected by a malware or a virus. This is …

Read More »

What to do if your Facebook account got hacked?

Millions of computer users of various countries today use Facebook, a truly innovative communication tool and a real masterpiece of Mark Zuckerberg. Sadly, cyber hackers these days invent various methods of hacking Facebook accounts. In many cases Facebook account can be hacked when users click a link that leads to a fake Facebook signup page, or login page. It outwardly …

Read More »

Google redirect virus removal tool

Right now many users worldwide experience the major and quite a serious problem. This is the issue of their search engine requests being redirected to other annoying and unwanted sites, and this is surely a challenge for many security sites to assist users in elimination of the causes for such undesirable behavior of their PCs. It is worth mentioning that …

Read More »

Beware of viruses spread via Facebook and other social networks

As you may know, the Internet is not so safe at present time. A lot of hackers can figure out numerous ways spreading different malicious programs if they want. And that is exactly what they do nowadays. We can catch viruses through different ways such as by uploading some program. And it can be not suspicious at all, but our …

Read More »