New Microsoft Exchange ‘ProxyToken’ Flaw Lets Attackers Reconfigure Mailboxes

Details have emerged about a now-patched security vulnerability impacting Microsoft Exchange Server that could be weaponized by an unauthenticated attacker to modify server configurations, thus leading to the disclosure of Personally Identifiable Information (PII). The issue, tracked as CVE-2021-33766 (CVSS score: 7.3) and coined “ProxyToken,” was discovered by Le Xuan Tuyen, a researcher at the Information Security Center of Vietnam Posts and Telecommunications Group (VNPT-ISC), and reported through the Zero-Day Initiative (ZDI) program in March 2021.…
Read more

CISA Adds Single-Factor Authentication to the List of Bad Practices

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added single-factor authentication to the short list of “exceptionally risky” cybersecurity practices that could expose critical infrastructure as well as government and the private sector entities to devastating cyberattacks. Single-factor authentication is a method of signing in users to websites and remote systems by using only one way of verifying their identity, typically a combination of username and password.…
Read more

Researchers Propose Machine Learning-based Bluetooth Authentication Scheme

A group of academics has proposed a machine learning approach that uses authentic interactions between devices in Bluetooth networks as a foundation to handle device-to-device authentication reliably. Called “Verification of Interaction Authenticity” (aka VIA), the recurring authentication scheme aims to solve the problem of passive, continuous authentication and automatic deauthentication once two devices are paired with one another, which remain authenticated until an explicit deauthentication action is taken, or the authenticated session expires.…
Read more

Attackers Can Remotely Disable Fortress Wi-Fi Home Security Alarms

New vulnerabilities have been discovered in Fortress S03 Wi-Fi Home Security System that could be potentially abused by a malicious party to gain unauthorized access with an aim to alter system behavior, including disarming the devices without the victim’s knowledge. The two unpatched issues, tracked under the identifiers CVE-2021-39276 (CVSS score: 5.3) and CVE-2021-39277 (CVSS score: 5.7), were discovered and reported by cybersecurity firm Rapid7 in May 2021 with a 60-day deadline to fix the weaknesses.…
Read more

Mortgage Crisis Billionaire John Paulson Describes Crypto as Bubble, Does Not Advise Going in It

Yuri Molchan Billionaire who bet against the U.S. housing market during the last mortgage crisis joins the camp of those who call cryptocurrencies a bubble Contents Paulson slams crypto, praises gold as inflation hedge Crypto is a “limited supply of nothing” John Paulson, who made a fortune for himself and investors when he shorted subprime mortgage bonds during the crisis that hit the U.S.…
Read more

Miners Expect Bitcoin to Hold Above $48,000, CryptoQuant Report Says, Here’s Why

Yuri Molchan According to the recent analytics data, Bitcoin is seeing a large accumulation demand and miners continue to accumulate mining inventory to mint BTC Recent reports by crypto data vendors CryptoQuant and Glassnode show that while Bitcoin’s hash rate is recovering to a good degree, Bitcoin miners continue to accumulate BTC mining gear.…
Read more

Over 1.3 Million Bitcoins Transferred by Anonymous Whales in Large Lumps

Yuri Molchan More than 2 million Bitcoins have been wired between anonymous wallets, from 2-4 extremely large transactions per hour were sent, while whales keep accumulating BTC Contents Whales shift over 1.3 million in Bitcoin Whales have been stocking up on the leading crypto Over the past 24 hours, a large number of crypto transactions carrying an average of 21,000 Bitcoins was spotted on the blockchain.…
Read more

Unique Visitors
» 3,009 Today
» 5,363 Yesterday
» 8,372 This Week
» 169,313 This Month
» 3,717,272 This Year
» 7,808,184 Total (since 2019-12-11)
» Record: 46,026 (2021-12-02)
Counter by DarkWeb.Solutions