Zero-day Clickjacking exploit impacts several password managers - gHacks Tech News

Many password managers have been found to be vulnerable to a specific form of attack. The technique that hackers are using is called Clickjacking. ADVERTISEMENT What is Clickjacking? Clickjacking is a method […]

gHacks Technology News
Hackers exploit 16 zero-days on first day of Pwn2Own Automotive 2025

On the first day of Pwn2Own Automotive 2025, security researchers exploited 16 unique zero-days and collected $382,750 in cash awards.

BleepingComputer
Pwn2Own Ireland Reveals Over 70 Zero-Day Vulnerabilities - RedPacket Security

A team from Vietnam emerged as the grand prize winner at the inaugural Pwn2Own Ireland event held on Friday, where Trend Micro's Zero Day Initiative (ZDI)

RedPacket Security

Security Week 2443: уязвимости нулевого дня в реальных атаках

На прошлой неделе подразделение Mandiant компании Google выпустило отчет , в котором сделана попытка проанализировать реальную эксплуатацию уязвимостей в атаках. Это достаточно важная метрика: далеко не все уязвимости, информация о которых так или иначе становится доступной, могут быть эксплуатированы для нанесения реального ущерба. Исследователи Google ограничили анализ уязвимостями, обнародованными в 2023 году. Из них был выделен набор из 138 багов, которые использовались в реальных атаках. Главный вывод исследования следующий: организаторы атак стали гораздо активнее использовать недавно обнаруженные уязвимости. Средний срок между появлением информации об уязвимости до начала ее эксплуатации для данного набора багов составил всего 5 дней. В предыдущем отчете за 2021 и 2022 годы этот показатель составлял 32 дня, а в начале 2021 года — и вовсе 44 дня. Более того, из 138 реально эксплуатируемых проблем в ПО 70% были впервые эксплуатированы до выпуска патчей (в 2021–2022 годах эта цифра составляла 62%).

https://habr.com/ru/companies/kaspersky/articles/852310/

#zero_day #google #иб

Security Week 2443: уязвимости нулевого дня в реальных атаках

На прошлой неделе подразделение Mandiant компании Google выпустило отчет , в котором сделана попытка проанализировать реальную эксплуатацию уязвимостей в атаках. Это достаточно важная метрика: далеко...

Хабр
Mozilla fixes Firefox zero-day actively exploited in attacks

Mozilla has issued an emergency security update for the Firefox browser to address a critical use-after-free vulnerability that is currently exploited in attacks.

BleepingComputer
Google now pays $250,000 for KVM zero-day vulnerabilities

Google has launched kvmCTF, a new vulnerability reward program (VRP) first announced in October 2023 to improve the security of the Kernel-based Virtual Machine (KVM) hypervisor that comes with $250,000 bounties for full VM escape exploits.

BleepingComputer

After several years of warning after warning after advisory after advisory and calls to repeatedly update or remove and NOT USE CHROME by the Department of Homeland Security, it should be inconceivable that anyone does - but they do.

Sometimes these are patched with automatic updates before horrific and catastrophic results occur, sometimes not. To be frank, part of the problem stems from the fact that Chrome is the largest attack surface out there where browsers are concerned, but notwithstanding it being the fav target are also serious privacy concerns that aren't shared by other chromium based browsers.

To be fair, many exploits are indeed shared by other chromium based browsers, but not most, while some are related to other browser capabilities, like WebRTC, but it's still best to just ditch Chrome and never look back.

Here's more coverage on vulnerabilities issued less than a month ago. It took 3 seconds to bring this up, and no, not using Google, which didn't reveal this when I tried that search engine in a subsequent search, lolz. Why would they return SERPs that poo poo their own product?

This one did come up in a google search

There's truly only one way to ensure safety - unplug. But there's a lot of simple things you can do to exact a reasonable level of security, so why not observe some of those best practices? It's not like it will cramp your style.

Anyway, that's my two cents. h/t to @darnell for raising awareness of this latest brokewell. Make sure you take the time to visit the link he's provided for you too.

There are plenty of #Browsers that run on #Android (to name a few, alphabetized):

- Brave Browser
- Chromium
- DuckDuckGo
- Firefox
- Kiwi
- Vivaldi

IMO, No one should be running Chrome - Desktop or otherwise. It's a privacy nightmare even when there aren't CERT warnings circulating.

#tallship #brokewell #zero_day #CISA #CERT #DHS

.

RE: https://one.darnell.one/users/darnell/statuses/112371221294882180

@darnell

Government issues an important warning for Google Chrome users, here’s what you can do - Times of India

TECH NEWS : Computer Emergency Response Team (CERT-in) has issued a new warning for Google Chrome web browser.

The Times of India
A review of zero-day in-the-wild exploits in 2023

Today, Google released its report “We’re All in this Together: A Year in Review of Zero-Days Exploited In-the-Wild in 2023.”

Google
Tesla hacked, 24 zero-days demoed at Pwn2Own Automotive 2024

Security researchers hacked a Tesla Modem and collected awards of $722,500 on the first day of Pwn2Own Automotive 2024 for three bug collisions and 24 unique zero-day exploits.

BleepingComputer
Tesla hacked, 24 zero-days demoed at Pwn2Own Automotive 2024

Security researchers hacked a Tesla Modem and collected awards of $722,500 on the first day of Pwn2Own Automotive 2024 for three bug collisions and 24 unique zero-day exploits.

BleepingComputer