Over Half of Insider Attacks Involve Privilege Elevation Exploits

Over 50% of insider attacks involve exploiting elevation of privilege flaws. A research study, based on data from January 2021 to April 2023, shows a rise in insider threats, with 55% relying on privilege escalation exploits and the remaining 45% introducing risks by...

Messenger and Facebook to get Default End to End Encryption

In a significant update, Meta has announced the rollout of default end-to-end encryption for personal messages and calls on Messenger and Facebook. This means that private chats and calls across Messenger will now be automatically encrypted by default, enhancing...

5Ghoul Vulnerabilities Affecting Most 5G Smart Phones

A set of 14 security vulnerabilities named “5Ghoul” has been discovered in the firmware implementation of 5G mobile network modems from major chipset vendors like MediaTek and Qualcomm. The flaws impact USB and IoT modems, along with hundreds of smartphone...

Critical Vulnerabilities Affects Multiple Atlassian Products

Atlassian has issued an email warning customers of four critical vulnerabilities, each rated 9.0 or higher. Confluence, Jira, and Bitbucket servers, as well as a companion app for macOS are affected. The vulnerabilities, rated at least 9.0 out of 10, include a...

Bluetooth Authentication Bypass Vulnerability in Apple and Linux

A Bluetooth authentication bypass vulnerability, tracked as CVE-2023-45866, has been discovered to be impacting Apple, Android, and some Linux devices. The bug allows attackers to connect to devices and inject keystrokes to execute arbitrary commands. It doesn’t...

Malicious WordPress Plugin Promoted Using Fake Security Advisory

WordPress administrators are being targeted by a fake security advisory email campaign that exploits a fictitious vulnerability (CVE-2023-45124) to install a malicious plugin on their websites. According to security researchers, the attackers sent deceptive emails to...