Skip to content
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • LABS
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap
GeekWire
GeekWire
  • HOME
  • NEWS
    • CERT
    • EXPLOITS
    • NCSC
    • NVD
    • SECURELIST
    • US-CERT
  • BLOG
    • Books
    • OSINT
    • Pentest
    • Privacy
  • GHDB
  • CHDB
  • OSINT
  • LABS
  • ARCHIVE
  • ABOUT
    • Privacy Policy
    • Terms of Use
    • External Links
    • Sitemap

MITM

Office 365 boosts email security against MITM, downgrade attacks

2 February 2022

Microsoft has added SMTP MTA Strict Transport Security (MTA-STS) support to Exchange Online to ensure Office 365 customers’ email …

Tags Cloud Computing, Cloud Software, IT, MITM, Office 365

Researchers Demonstrate New Way to Detect MITM Phishing Kits in the Wild

16 November 2021

No fewer than 1,220 Man-in-the-Middle (MitM) phishing websites have been discovered as targeting popular online services like Instagram, …

Tags Detect, Identity Theft, MITM, New, Phishing

Apple AirDrop has “significant privacy leak”, say German researchers

23 April 2021

Security researchers at the Technical University of Darmstadt in Germany have just put out a press release about an academic paper …

Tags German, iOS, MITM, Mobile Development, Privacy

Bluetooth Bug Opens Devices to Man-in-the-Middle Attacks

10 September 2020

A high-severity Bluetooth vulnerability has been uncovered, which could enable an unauthenticated attacker within wireless range to …

Tags Attacks, Bluetooth, MITM, Security Pro, Vulnerability

Bluetooth Bug Could Allow MITM Attacks

10 September 2020

Security researchers have discovered a new vulnerability in Bluetooth which could allow attackers to perform man in the middle (MITM) …

Tags Attacks, Bluetooth, IT, MITM, News

New vulnerability lets hackers use your credit card without pin code

29 August 2020

Every time we make a payment using credit/debit cards, the EMV communication protocol is used for processing payments. Having been …

Tags Android, Google, MITM, Mobile Development, New

Tor and anonymous browsing – just how safe is it?

13 August 2020

An article published on the open-to-allcomers blogging site Medium earlier this week has made for some scary headlines. Written as an …

Tags Bitcoins, MITM, Privacy, Scams, Snooping

Convincing Google Impersonation Opens Door to MiTM, Phishing

16 March 2020

An attack that uses homographic characters to impersonate domain names and launch convincing but malicious websites takes minutes and a …

Tags Door, Impersonation, Man-In-The-Middle, MITM, Web Security

Google recalls Titan Bluetooth keys after finding security flaw

17 May 2019

Google had egg on its face this week after it had to recall some of its Titan hardware security keys for being insecure. Titan is …

Tags 2-Factor Authentication, 2fa, Bluetooth, Man-In-The-Middle Attacks, MITM, Organisations, Security Flaws, Security Threats, Two-Factor Authentication

Vulnerabilities in financial mobile apps put consumers and businesses at risk

8 May 2019

Security hubris. It’s the phrase we use to refer to our feeling of confidence grounded on assumptions we all have (but may not be aware …

Tags Financials, Man-In-The-Middle, MITM, Security Pro, SQL Injection, Vulnerability

D-Link Camera Vulnerability let Hackers Hijack the Camera and Tap the Video Streaming

4 May 2019

Critical vulnerability in D-Link cloud camera allows attackers to hijack and intercept the camera to see the live video streaming and …

Tags Cameras, Computer Security, Cyber Threats, D-Link, Hacking, Hacks, Hijack, MITM, Network Security

How Man in the Middle Attacks Cause Damage

25 April 2019

Security breaches in a computer network can have disastrous results. They may be the cause of company secrets leaking out or result in …

Tags Admins, Attacks, Basics, Damage, GNU, GNU/Linux, How, MITM, Sources

Of hoodies and headphones: a spotlight on risks surrounding audio output devices

22 April 2019

April 24, 2012 – The fight against malware is a cat-and-mouse game. It is constant and constantly …

Tags American Heart Association, BlueBorne, MITM, Sennheiser

Dangerous Function in UC Browser Lets Hackers to Hijack Millions Of Android Users via MITM Attacks

27 March 2019

Potentially dangerous future in UC browser allow Hundreds of millions of Android users under high risk that allows hackers to hijack …

Tags Android Security, Attacks, Computer Security, Cyber Threats, Functions, Google Play, Hacking, Hijack, MITM
Post navigation
Older posts
Page1 Page2 Next →
Cookie-Free

NVD

  • CVE-2022-20253 – In Bluetooth, there is a possible cleanup failure due to an uncaught exception. This could …12 August 2022
  • CVE-2022-20275 – In DevicePolicyManager, there is a possible way to determine whether an app is installed, …12 August 2022
  • CVE-2022-20291 – In AppOpsService, there is a possible way to determine whether an app is installed, withou …12 August 2022
  • CVE-2022-20307 – In AlarmManagerService, there is a possible way to determine whether an app is installed, …12 August 2022
  • CVE-2022-20323 – In PackageManager, there is a possible package installation disclosure due to a missing pe …12 August 2022
  • CVE-2022-20340 – In SELinux policy, there is a possible way of inferring which websites are being opened in …12 August 2022

EXPLOITS

  • Feehi CMS 2.1.1 – Stored Cross-Site Scripting (XSS)9 August 2022
  • Prestashop blockwishlist module 2.1.0 – SQLi9 August 2022
  • PAN-OS 10.0 – Remote Code Execution (RCE) (Authenticated)9 August 2022
  • ThingsBoard 3.3.1 ‘description’ – Stored Cross-Site Scripting (XSS)9 August 2022
  • ThingsBoard 3.3.1 ‘name’ – Stored Cross-Site Scripting (XSS)9 August 2022
  • uftpd 2.10 – Directory Traversal (Authenticated)3 August 2022

SECURELIST

  • OpenTIP, command line edition11 August 2022
  • VileRAT: DeathStalker’s continuous strike at foreign and cryptocurrency exchanges10 August 2022
  • Andariel deploys DTrack and Maui ransomware9 August 2022
  • Targeted attack on industrial enterprises and public institutions8 August 2022
  • DDoS attacks in Q2 20223 August 2022
  • LofyLife: malicious npm packages steal Discord tokens and bank card data28 July 2022
Copyright © 2022 GeekWire | Cookie-Free | Privacy Policy | We are not responsible for the content of external sites.
Next Page »