Exploits
Discover expert analysis on exploits with news, features and insights from the team at IT Pro.
-
Malware operators abusing Windows shortcuts to bypass VBA macro blockNews The likes of Emotet and Qakbot, as well as Russia-linked state-sponsored hackers, have all pivoted to the new infection technique
By Connor Jones Published
News -
GPS tracker exploit puts the world's most high-value individuals in real-world dangerNews Vulnerabilities in a GPS tracker used by governments, militaries, and Fortune 50 companies could be used to track the locations of high-value targets and disable emergency service vehicles
By Connor Jones Published
News -
How to protect against 'endemic' Log4j vulnerabilitiesNews A US government report details a series of recommendations to help counter the Log4Shell flaw in the long term
By Daniel Todd Published
News -
Retbleed hardware-level flaw brings overhead woe to Intel and AMDNews ‘Retbleed’ threatens a wide range of microprocessors, using a vector thought safe that adds to its problematic nature
By Rory Bathgate Published
News -
Chinese hackers exploit Microsoft zero-day as list of vulnerable Office products growsNews Microsoft has published a support guide and temporary workarounds for IT admins to mitigate the threat
By Connor Jones Published
News -
Researchers demonstrate how to install malware on iPhone after it's switched offNews The most recent iPhones are found to be vulnerable after researchers discover an exploit in a beloved iOS 15 feature
By Connor Jones Published
News -
Actively exploited Windows vulnerability reaches peak severity when paired with popular attackNews May 2022's routine Patch Tuesday fixes seven 'critical' issues, including a familiar headache for IT administrators
By Connor Jones Published
News -
Microsoft's massive 145-vulnerability Patch Tuesday fixes ten critical exploitsNews This month's round of patches is now available with some exploits proving to be particularly dangerous
By Connor Jones Published
News -
Microsoft Patch Tuesday fixes Windows 11 system reset bugNews A host of fixes are available to Windows administrators as Microsoft patches three critical RCEs flaws
By Connor Jones Published
News -
Google doubles bug bounty rewards for Linux, Kubernetes exploitsNews The increased rewards are said to align better with the community's expectations of a bug bounty programme of this kind
By Connor Jones Published
News -
12-year-old Linux root privilege flaw has been "hiding in plain sight"News Researchers were quick to highlight how easy it was to exploit the vulnerability, recommending urgent patches
By Connor Jones Published
News -
El Salvador becomes latest target of Pegasus spywareNews The list of nations with access to Pegasus is growing, with evidence pointing to potential links between 35 confirmed Pegasus cases and the Salvadoran government
By Connor Jones Published
News