article thumbnail

Stalkerware Installations Up 60% in 2019

Adam Levin

The number of stalkerware apps detected on smartphones increased in 2019, a full 60% over the previous year according to a new report released by Kaspersky Labs. . This is thought to be the way Amazon founder and CEO Jeff Bezos was hacked in 2019. The post Stalkerware Installations Up 60% in 2019 appeared first on Adam Levin.

Malware 236
article thumbnail

Patch Tuesday, August 2019 Edition

Krebs on Security

Security vendor Qualys says two of these weaknesses can be exploited remotely without any authentication or user interaction. For those keeping score, this is the fourth time in 2019 Microsoft has had to fix critical security issues with its Remote Desktop service.

Backups 240
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

U.S. CISA adds Palo Alto Expedition, Android, CyberPanel and Nostromo nhttpd bugs to its Known Exploited Vulnerabilities catalog

Security Affairs

CVE-2024-51567 – is an incorrect default permissions vulnerability in CyberPanel (prior to patch 5b08cd6) that allows remote attackers to bypass authentication and execute arbitrary commands through /dataBases/upgrademysqlstatus by manipulating the statusfile property with shell metacharacters, bypassing secMiddleware.

Firewall 130
article thumbnail

Sansec uncovered a supply chain attack via 21 backdoored Magento extensions

Security Affairs

Sansec identified these backdoors in the following packages which were published between 2019 and 2022.” ” Below are the backdoored extensions that were published between 2019 and 2022. In older versions (2019), this required no authentication, but newer versions require a secret key.

article thumbnail

Latest on the SVR’s SolarWinds Hack

Schneier on Security

Separately, it seems that the SVR conducted a dry run of the attack five months before the actual attack: The hackers distributed malicious files from the SolarWinds network in October 2019, five months before previously reported files were sent to victims through the company’s software update servers. We know at minimum they had access Oct.

Hacking 359
article thumbnail

Hacking Digitally Signed PDF Files

Schneier on Security

Interesting paper: “ Shadow Attacks: Hiding and Replacing Content in Signed PDFs “: Abstract: Digitally signed PDFs are used in contracts and invoices to guarantee the authenticity and integrity of their content. In 2019, Mladenov et al. A user opening a signed PDF expects to see a warning in case of any modification.

Hacking 363
article thumbnail

How to better secure user authentication protocols

CyberSecurity Insiders

The vulnerability, dubbed ProxyToken, lets attackers bypass the authentication process to access victims’ emails and configure their mailboxes. Normally, Exchange uses two sites, a front and back end, to authenticate users. ProxyToken sends an authentication request with a non-empty SecurityToken cookie to trigger this feature.