Explained – How Intel AMT Vulnerability Allows to Hack Computers Remotely

Friday, May 5th, 2017

Earlier this week Intel announced a critical escalation of privilege bug that affects its remote management features shipping with Intel Server chipsets for past 7 years, which, if exploited, would allow a remote attacker to take control of vulnerable PCs, laptops, or servers. The vulnerability, labeled CVE-2017-5689, affects Intel remote management ...

Most of the Shadow Brokers exploits are already patched

Saturday, April 15th, 2017

This is getting a ton of press lately, but here is Microsoft's response to the latest leaks: Today, Microsoft triaged a large release of exploits made publicly available by Shadow Brokers. Understandingly, customers have expressed concerns around the risk this disclosure potentially creates. Our engineers have investigated the disclosed exploits, and ...

Booby-trapped Word documents in the wild exploit critical Microsoft 0day

Saturday, April 8th, 2017

There's a new zeroday attack in the wild that's surreptitiously installing malware on fully-patched computers. It does so by exploiting a vulnerability in most or all versions of Microsoft Word. The attack starts with an e-mail that attaches a malicious Word document, according to a blog post published Saturday by researchers ...

Easy-to-exploit authentication bypass flaw puts Netgear routers at risk

Wednesday, February 1st, 2017

For the past half year Netgear has been working on fixing a serious and easy-to-exploit vulnerability in many of its routers. And it's still not done. While Netgear has worked to fix the issue, the list of affected router models increased to 30, of which only 20 have firmware fixes available ...

Widely used WebEx plugin for Chrome will execute attack code

Monday, January 23rd, 2017

The Chrome browser extension for Cisco Systems WebEx communications and collaboration service was just updated to fix a vulnerability that leaves all 20 million users susceptible to drive-by attacks that can be carried out by just about any website they visit. A combination of factors makes the vulnerabilities among the most ...