Tuesday, 14 July 2020

New Highly-Critical SAP Bug Could Let Attackers Take Over Corporate Servers

The Hacker News Daily Updates
Newsletter
cover

The Email Security Guide: Essential Tips to Protect Your Inbox

It's time to secure your most important digital asset!

Download Now Sponsored
LATEST NEWS Jul 14, 2020

CompTIA Certification Prep Courses – Get Lifetime Access @ 99% Discount

In the world of professional IT, recruiters look for certificates as an important criterion for eligibility and assessing skills. Any IT professional with résumé that includes CompTIA certificates tends to rise up the pile. Of course, there are many different CompTIA exams you can choose from ...

Read More
Twitter Facebook LinkedIn

New Highly-Critical SAP Bug Could Let Attackers Take Over Corporate Servers

SAP has patched a critical vulnerability impacting the LM Configuration Wizard component in NetWeaver Application Server (AS) Java platform, allowing an unauthenticated attacker to take control of SAP applications. The bug, dubbed RECON and tracked as CVE-2020-6287, is rated with a maximum CVSS ...

Read More
Twitter Facebook LinkedIn

Exclusive: Any Chingari App (Indian TikTok Clone) Account Can Be Hacked Easily

Following vulnerability disclosure in the Mitron app, another viral TikTok clone in India has now been found vulnerable to a critical but easy-to-exploit authentication bypass vulnerability, allowing anyone to hijack any user account and tamper with their information, content, and even upload ...

Read More
Twitter Facebook LinkedIn

Unpatched Critical Flaw Disclosed in Zoom Software for Windows 7 or Earlier

A zero-day vulnerability has been discovered in Zoom video conferencing software for Windows that could allow an attacker to execute arbitrary code on a victim's computer running Microsoft Windows 7 or older. To successfully exploit the zoom vulnerability, all an attacker needs to do is tricking a ...

Read More
Twitter Facebook LinkedIn

Joker Malware Apps Once Again Bypass Google's Security to Spread via Play Store

Cybersecurity researchers took the wraps off yet another instance of Android malware hidden under the guise of legitimate applications to stealthily subscribe unsuspecting users for premium services without their knowledge. In a report published by Check Point research today, the malware — ...

Read More
Twitter Facebook LinkedIn
cover

The Email Security Guide: Essential Tips to Protect Your Inbox

It's time to secure your most important digital asset!

Download Now Sponsored

This email was sent to balvistudio4.raaj@blogger.com. You are receiving this newsletter because you opted-in to receive relevant communications from The Hacker News. To manage your email newsletter preferences, please click here.

Contact The Hacker News: info@thehackernews.com
Unsubscribe

The Hacker News | Pearls Omaxe, Netaji Subash Place, Pitampura, Delhi 110034 India

No comments:

Post a Comment