Tag: Authentication Bypass
-
Azure AD ‘Log in With Microsoft’ Authentication Bypass Affects Thousands
Organizations that have implemented the “Log in with Microsoft” feature in their Microsoft Azure Active Directory environments could …
-
Kaseya Hacked via Authentication Bypass
The Kaseya ransomware attack is believed to have been down to an authentication bypass. Yes, ransomware needs to be on your radar — but …
-
Firewall Vendor Patches Critical Auth Bypass Flaw
Germany-based cybersecurity company Genua has fast-tracked a fix for a critical flaw in one of its firewall products. If exploited, the …
-
Multiple Wireless Router Chipsets Affected by Authentication Bypass Vulnerability
Details of an authentication bypass vulnerability present in multiple wireless router chipsets have been set out in an advisory published …
-
Critical ‘Sign in with Apple’ Bug Could Have Let Attackers Hijack Anyone’s Account
Apple recently paid Indian vulnerability researcher Bhavuk Jain a huge $100,000 bug bounty for reporting a highly critical vulnerability …
-
Salt Bugs Allow Full RCE as Root on Cloud Servers
The open-source Salt management framework contains high-severity security vulnerabilities that allow full remote code execution as root on …
-
Critical Bug in WordPress Plugins Open Sites to Hacker Takeovers
Security researchers are warning users of two WordPress plugins made by Brainstorm Force that they need to patch a “major” …
-
OpenBSD addresses authentication bypass, privilege escalation issues
Experts from Qualys Research Labs discovered four high-severity security flaws in OpenBSD, one of which is a type authentication bypass …
-
Severe Auth Bypass and Priv-Esc Vulnerabilities Disclosed in OpenBSD
OpenBSD, an open-source operating system built with security in mind, has been found vulnerable to four new high-severity security …
-
Galaxy S10 Fingerprint Sensor Thwarted With Screen Protector: Report
A woman alleges that a $3 smartphone screen protector allowed unauthorized users to bypass her Samsung Galaxy S10’s fingerprint …
-
Sneaky phishing campaign beats two-factor authentication
Protecting an account with multi-factor authentication (MFA) is a no-brainer, but that doesn’t mean every method for doing this is …
-
The libssh “login with no password” bug – what you need to know
There’s a big brouhaha about a recently discovered SSH bug that could let crooks log into your computer without a password. SSH is very …
●●●