[HackerNews] WhatsApp Photo Filter Bug Could Have Exposed Your Data to Remote Attackers

A now-patched high-severity security vulnerability in WhatApp’s image filter feature could have been abused to send a malicious image over the messaging app to read sensitive information from the app’s memory.
Tracked as CVE-2020-1910 (CVSS score: 7.8), the flaw concerns an out-of-bounds read/write and stems from applying specific image filters to a rogue image and sending the altered image to

Source: Read More (The Hacker News)

You might be interested in …

[NCSC-FI News] Backdoor in public repository used new form of attack to target big firms

A backdoor that researchers found hiding inside open source code targeting four German companies was the work of a professional penetration tester. The tester was checking clients’ resilience against a new class of attacks that exploit public repositories used by millions of software projects worldwide. But it could have been bad. Very bad. Source: Read […]

Read More

[NCSC-FI News] Supo ja Säpo: Suomi ja Ruotsi varautuneet Venäjän vaikutusyrityksiin, mutta toistaiseksi ollut rauhallista

Venäjällä arvioidaan olevan juuri nyt suuri tarve tiedustelutiedolle Nato-prosesseista. Ruotsin ja Norjan turvallisuuspalveluiden johtajat vierailevat Suomessa. Venäjällä arvioidaan olevan juuri nyt suuri tarve tiedustelutiedolle Nato-prosesseihin liittyen, minkä takia Supo varoittaa kybervakoilusta. Myös palvelunestohyökkäysten arvioidaan jatkuvan. Source: Read More (NCSC-FI daily news followup)

Read More

[SecurityWeek] Newly Disclosed Vulnerability Allows Remote Hacking of Siemens PLCs

All posts, Security Week

Researchers at industrial cybersecurity firm Claroty have identified a serious vulnerability that can be exploited by a remote and unauthenticated attacker to hack some of the programmable logic controllers (PLCs) made by Siemens. read more Source: Read More (SecurityWeek RSS Feed)

Read More

Leave a Reply

Your email address will not be published.

This site uses Akismet to reduce spam. Learn how your comment data is processed.