Critical RCE Zero-Day in TP-Link Wi-Fi Repeaters Let Hackers to Gain Remote Access

Wi-Fi extender

Researchers discovered a critical zero-day flaw in TP-Link Wi-Fi extender that allows a remote attacker to get complete control over the device and to execute commands in user privileges. This vulnerability can be tracked as CVE-2019-7406, and it affects the following models: RE650, RE350, RE365, and RE500. Like other routers, the extender also operates on […]

The post Critical RCE Zero-Day in TP-Link Wi-Fi Repeaters Let Hackers to Gain Remote Access appeared first on GBHackers On Security.

Read more

New Android malware bypass 2FA & steal one-time passwords

By Uzair Amir

These apps were designed to pass as BtcTurk, a Turkish cryptocurrency exchange. Researcher Lukas Stefanko at the Slovakian security firm ESET has discovered Android malware in new apps that can bypass the SMS-based two-factor authentication (2FA) without using SMS permissions. The malicious apps are available on the very reliable platform Google Play Store. Don’t buy […]

This is a post from HackRead.com Read the original post: New Android malware bypass 2FA & steal one-time passwords

Read more

Cellebrite claims its new tool unlocks almost any iOS or Android device

By Waqas

Cellebrite is the same company which helped the FBI to unlock iPhone device of San Bernardino shooter. Renowned Law Enforcement contractor, the Israel-based forensics firm Cellebrite has claimed that they have developed a perfect tool to hack almost every high-end Android and iOS device, which is definitely good news for law enforcement agencies. In a […]

This is a post from HackRead.com Read the original post: Cellebrite claims its new tool unlocks almost any iOS or Android device

Read more

5 Keys to Improve Your Cybersecurity

Cybersecurity isn’t easy. If there was a product or service you could buy that would just magically solve all of your cybersecurity problems, everyone would buy that thing, and we could all rest easy. However, that is not the way it works. Technology continues to evolve. Cyber attackers adapt and develop new malicious tools and techniques, and cybersecurity vendors design creative new ways to

Read more

Multiple Vulnerabilities with NETGEAR Wireless Routers Allows Attackers to Access Sensitive Information

Multiple Vulnerabilities with NETGEAR Wireless Routers Allows Attackers to Access Sensitive Information

Researchers discovered multiple vulnerabilities with some NETGEAR wireless routers that allow an attacker to access sensitive information. The vulnerability exists in the KCodes’ NetUSB kernel module. Only specific models of NETGEAR wireless routers use the kernel module from KCodes; the module shares USB devices over TCP, which allows clients to connect with various drivers and […]

The post Multiple Vulnerabilities with NETGEAR Wireless Routers Allows Attackers to Access Sensitive Information appeared first on GBHackers On Security.

Read more

How I Discovered My First Vulnerability

By David Balaban

I have read a couple of books recently about different vulnerabilities in order to be able to better protect my projects/websites. Today, I want to share a story about how I managed to use this knowledge in practice. Disclaimer This material is posted for educational purposes only. The author is not responsible for its usage […]

This is a post from HackRead.com Read the original post: How I Discovered My First Vulnerability

Read more