Attackers can steal NTLM password hashes via calendar invites
A recently patched vulnerability in Microsoft Outlook (CVE-2023-35636) that can be used by attackers to steal users’ NTLM v2 hashes can be exploited by adding two headers to an email carrying a specially crafted file, security researcher Dolev.....»»
Android malware uses NFC to steal money at ATMs
ESET researchers uncovered NGate malware, which can relay data from victims’ payment cards via a malicious app installed on their Android devices to the attacker’s rooted Android phone. Attack overview (Source: ESET) Unauthorized ATM withdrawals.....»»
Don’t miss this 30% deal on the Blink Video Doorbell system!
The Blink Video Doorbell is currently enjoying a 30% discount on Amazon right now, making it a steal if you’re in the market! The post Don’t miss this 30% deal on the Blink Video Doorbell system! appeared first on Phandroid. Putting to.....»»
The Samsung Galaxy Tab S6 Lite is an ABSOLUTE STEAL with this 36% discount!
The Samsung Galaxy Tab S6 Lite is currently 36% off in this limited time deal, so if you’re looking for a cheap tablet, this is it! The post The Samsung Galaxy Tab S6 Lite is an ABSOLUTE STEAL with this 36% discount! appeared first on Phandroid......»»
PostgreSQL databases under attack
Poorly protected PostgreSQL databases running on Linux machines are being compromised by cryptojacking attackers. The attack – observed by Aqua Security researchers on a honeypot system – starts with the threat actors brute-forcing access.....»»
Samsung could steal this iPhone feature for the Galaxy S25 Ultra
According to the rumors, the Samsung Galaxy S25 Ultra could bump its screen size up to 6.9-inches while slimming its bezels. The post Samsung could steal this iPhone feature for the Galaxy S25 Ultra appeared first on Phandroid. Since the S.....»»
Walmart is selling this 24-inch gaming monitor for $82 today
Snap up a 24-inch gaming monitor for a steal of a price at Walmart right now and enjoy a higher refresh rate than usual......»»
I tested two open-source password managers, and one is clearly better
We compare the top two best open-source password managers, both free and paid plans ,to find out which is the best choice for you......»»
Vulnerabilities in Microsoft macOS apps may give attackers access to microphone, camera
Vulnerabilities in popular Microsoft apps for macOS can be abused by attackers to record video and audio clips, take pictures, access and exfiltrate data and send emails, Cisco Talos researchers have discovered. Library injection vulnerabilities in M.....»»
Vulnerability in Microsoft apps allowed hackers to spy on Mac users
A vulnerability found in Microsoft apps for macOS allowed hackers to spy on users. Security researchers from Cisco Talos reported in a blog post how the vulnerability could be exploited by attackers and what Microsoft has been doing to fix the explo.....»»
Security flaws in Microsoft Mac apps could let attackers spy on users
Cisco Talos recently uncovered security vulnerabilities in several Microsoft apps for macOS that can potentially let attackers spy on your camera and other system components.Security flaws found in Microsoft apps for MacTalos claims to have found eig.....»»
Week in review: MS Office flaw may leak NTLM hashes, malicious Chrome, Edge browser extensions
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Unpatched MS Office flaw may leak NTLM hashes to attackers (CVE-2024-38200) A new MS Office zero-day vulnerability (CVE-2024-38200) can be exploited.....»»
Beware of fake WhatsApp groups that are stealing accounts!
It seems that there is a rise of fake WhatsApp groups that pretend to be someone you know to steal your account. The post Beware of fake WhatsApp groups that are stealing accounts! appeared first on Phandroid. Scams are everywhere out ther.....»»
Hide yo environment files! Or risk getting your cloud-stored data stolen and held for ransom
Cybercriminals are breaking into organizations’ cloud storage containers, exfiltrating their sensitive data and, in several cases, have been paid off by the victim organizations to not leak or sell the stolen data. “The attackers behind t.....»»
Critical RCE bug in SolarWinds Web Help Desk fixed (CVE-2024-28986)
SolarWinds has fixed a critical vulnerability (CVE-2024-28986) in its Web Help Desk (WHD) solution that may allow attackers to run commands on the host machine. “While it was reported as an unauthenticated vulnerability, SolarWinds has been una.....»»
How passkeys eliminate password management headaches
In this Help Net Security interview, David Cottingham, President at rf IDEAS, discusses the key benefits organizations can expect when implementing passkeys. Cottingham addresses the misconceptions surrounding the adoption of passkeys, particularly i.....»»
How to create reminders in Calendar in iOS 18
A significant enhancement in the iOS 18 Calendar app is its integration with Reminders, allowing you to manage everything in one app. Here's how to get started.How to add reminders to the iOS 18 Calendar appManaging schedules and tasks can quickly be.....»»
These exceptional Sony wireless headphones are over 40% off today
The Sony WH-1000XM4 wireless headphones with active noise cancellation and a 30-hour battery life are a steal at their discounted price of $198 from Amazon......»»
Unpatched MS Office flaw may leak NTLM hashes to attackers (CVE-2024-38200)
A new MS Office zero-day vulnerability (CVE-2024-38200) can be exploited by attackers to grab users’ NTLM hashes, Microsoft has shared late last week. The vulnerability is exploitable remotely and requires no special privileges or user interact.....»»
Dell’s G16 gaming laptop just dropped under $1,000
You can buy the ever popular Dell G16 gaming laptop with RTX 4060 for a steal of a price at Dell right now......»»
Critical 1Password flaws may allow hackers to snatch your passwords (CVE-2024-42219, CVE-2024-42218)
Two vulnerabilities (CVE-2024-42219, CVE-2024-42218) affecting the macOS version of the popular 1Password password manager could allow malware to steal secrets stored in the software’s vaults and obtain the account unlock key, AgileBits has con.....»»