Android Smartphones Vulnerable to Fingerprint Brute Force Attacks
Android Smartphones Vulnerable to Fingerprint Brute Force Attacks
  • Alert & Advisory
  • July 24, 2023

A new method of bypassing user authentication on smartphones running the Android, HarmonyOS, and iOS operating systems has been discovered. The method has been dubbed 'BrutePrint' by its discoverers, Tencent Labs and Zhejiang University, because it employs brute force attacks to crack modern smartphone authentication mechanisms such as fingerprints to bypass user authentication and take control of the device.

ESXi Remote Code Execution Vulnerability
ESXi Remote Code Execution Vulnerability
  • Vulnerability
  • July 21, 2023

Investigation revealed that the vulnerability ESXi versions 6.0, 6.5 and 6.7 running on any platform, and the Horizon cloud desktop-as-a-service (DaaS) platform version 8.x. could be exploited to perform remote code execution.

ngCERT Advisory Microsoft Exchange 2013 and Newer are vulnerable to NTLM relay attacks
ngCERT Advisory Microsoft Exchange 2013 and Newer are vulnerable to NTLM relay attacks
  • Alert & Advisory
  • July 21, 2023

ngCERT Advisory Microsoft Exchange 2013 and Newer are vulnerable to NTLM relay attacks

ngCERT Advisory 19-years-old WinRAR vulnerability leads to over 100 malware exploits
ngCERT Advisory 19-years-old WinRAR vulnerability leads to over 100 malware exploits
  • Alert & Advisory
  • July 21, 2023

ngCERT Advisory 19-years-old WinRAR vulnerability leads to over 100 malware exploits

Windows BlueKeep Vulnerability
Windows BlueKeep Vulnerability
  • Vulnerability
  • July 21, 2023

BlueKeep Vulnerability exists within the Remote Desktop Protocol (RDP) used by the Microsoft Windows Operating Systems (OSs). An attacker can exploit this vulnerability to perform remote code execution on an unprotected system.

Related Articles