Hackers often target remote assist tools because they create a direct channel to access desired systems with minimum effort.
Category: Vulnerabilities
Teslas Can Still Be Stolen With a Cheap Radio Hack—Despite New Keyless Tech | WIRED
For at least a decade, a car theft trick known as a “relay attack” has been the modern equivalent of hot-wiring: a cheap and relatively easy technique to steal hundreds of models of vehicles.
Phishing statistics that will make you think twice before clicking – Help Net Security
This article includes excerpts from various reports that offer statistics and insights into the current phishing landscape.
Rise of zero-day exploits reshape security recommendations | CSO Online
With zero-day attacks rapidly eclipsing exploits of known flaws, CISOs face the specter of having to switch up their security strategies in favor of post-exploitation response.
Someone connected Windows XP to the internet, and it didn’t survive long
https://www.xda-developers.com/connected-windows-xp-internet-didnt-survive-long/
Linux maintainers were infected for 2 years by SSH-dwelling backdoor with huge reach | Ars Technica
https://arstechnica.com/security/2024/05/ssh-backdoor-has-infected-400000-linux-servers-over-15-years-and-keeps-on-spreading/2/
Microsoft Warns of Active Zero-Day Exploitation, Patches 60 Windows Vulnerabilities – SecurityWeek
https://www.securityweek.com/microsoft-patches-60-windows-vulns-warns-of-active-zero-day-exploitation/
Intel issues advisories for 90 security vulnerabilities — includes critical level 10 for AI tools | Tom’s Hardware
https://www.tomshardware.com/tech-industry/cyber-security/intel-issues-advisories-for-90-security-vulnerabilities-includes-critical-level-10-for-ai-tools