PROJET AUTOBLOG


The Hacker News

Site original : The Hacker News

⇐ retour index

Linphone SIP Stack Bug Could Let Attackers Remotely Crash Client Devices

mercredi 1 septembre 2021 à 17:19
Cybersecurity researchers on Tuesday disclosed details about a zero-click security vulnerability in Linphone Session Initiation Protocol (SIP) stack that could be remotely exploited without any action from a victim to crash the SIP client and cause a denial-of-service (DoS) condition. Tracked as CVE-2021-33056 (CVSS score: 7.5), the issue concerns a NULL pointer dereference vulnerability in the

[LIVE WEBINAR] How Lean Security Teams Can Improve Their Time to Response

mercredi 1 septembre 2021 à 14:50
Cybersecurity could be described as a marathon for security teams that spend most of their time building sustained defenses that prevent threats day after day. However, they must be ready to hit a sprint whenever an attack succeeds since attack duration, and the resulting damages are directly correlated.  Reacting to a successful attack is a major challenge for lean security teams today since

QNAP Working on Patches for OpenSSL Flaws Affecting its NAS Devices

mercredi 1 septembre 2021 à 09:11
Network-attached storage (NAS) appliance maker QNAP said it's currently investigating two recently patched security flaws in OpenSSL to determine their potential impact, adding it will release security updates should its products turn out to be vulnerable. Tracked as CVE-2021-3711 (CVSS score: 7.5) and CVE-2021-3712 (CVSS score: 4.4), the weaknesses concern a high-severity buffer overflow in SM2

Researchers Propose Machine Learning-based Bluetooth Authentication Scheme

mardi 31 août 2021 à 15:00
A group of academics has proposed a machine learning approach that uses authentic interactions between devices in Bluetooth networks as a foundation to handle device-to-device authentication reliably. Called "Verification of Interaction Authenticity" (aka VIA), the recurring authentication scheme aims to solve the problem of passive, continuous authentication and automatic deauthentication once

Attackers Can Remotely Disable Fortress Wi-Fi Home Security Alarms

mardi 31 août 2021 à 15:00
New vulnerabilities have been discovered in Fortress S03 Wi-Fi Home Security System that could be potentially abused by a malicious party to gain unauthorized access with an aim to alter system behavior, including disarming the devices without the victim's knowledge. The two unpatched issues, tracked under the identifiers CVE-2021-39276 (CVSS score: 5.3) and CVE-2021-39277 (CVSS score: 5.7),