Exploits
Latest about Exploits
![The Zoom logo on a glass building, with blue sky above](https://cdn.mos.cms.futurecdn.net/wuzHgBiQFawtYcrSJSEvjP-320-80.jpg)
Zoom patches privilege escalation flaw for macOS users
By Rory Bathgate published
News Threat actors were able to use the application’s updater to distribute malicious files at superuser level
![Microsoft Windows 11 logo on a smartphone set against a background of neon blue code on a screen to denote a cyber security theme](https://cdn.mos.cms.futurecdn.net/7VYEef5aeuutQXcvxqPgUc-320-80.jpg)
Dogwalk RCE variant among 121 vulnerabilities fixed in Microsoft's August Patch Tuesday
By Connor Jones published
News The second-biggest security update released by Microsoft this year featured 17 critical-rated RCEs and privilege escalation bugs
![Black screen with neon blue lines of code written across and a skull shape appears overlayed the code](https://cdn.mos.cms.futurecdn.net/9Xr5cbyCaue8fcgNdkming-320-80.jpg)
Malware operators abusing Windows shortcuts to bypass VBA macro block
By Connor Jones published
News The likes of Emotet and Qakbot, as well as Russia-linked state-sponsored hackers, have all pivoted to the new infection technique
![A hacker against a red background](https://cdn.mos.cms.futurecdn.net/xH65SKaC9StGBUq7g6tS57-320-80.jpg)
GPS tracker exploit puts the world's most high-value individuals in real-world danger
By Connor Jones published
News Vulnerabilities in a GPS tracker used by governments, militaries, and Fortune 50 companies could be used to track the locations of high-value targets and disable emergency service vehicles
![A mockup of the log4j Java library logo](https://cdn.mos.cms.futurecdn.net/2TtAA7dfubasXLungMhtnX-320-80.jpg)
How to protect against 'endemic' Log4j vulnerabilities
By Daniel Todd published
News A US government report details a series of recommendations to help counter the Log4Shell flaw in the long term
![A graphic of a red CPU with a white skull and crossbones on it, placed upon a grey background](https://cdn.mos.cms.futurecdn.net/onEWfxvKwBT93pFnuYEnGV-320-80.jpg)
Retbleed hardware-level flaw brings overhead woe to Intel and AMD
By Rory Bathgate published
News ‘Retbleed’ threatens a wide range of microprocessors, using a vector thought safe that adds to its problematic nature
![Microsoft Office 365 image, with a magnifying glass over Microsoft Word](https://cdn.mos.cms.futurecdn.net/xrgj9PF6FCZYP28wvvrMNh-320-80.jpg)
Chinese hackers exploit Microsoft zero-day as list of vulnerable Office products grows
By Connor Jones published
News Microsoft has published a support guide and temporary workarounds for IT admins to mitigate the threat
![Apple logo on the side of a building](https://cdn.mos.cms.futurecdn.net/kdWQYRnebCeRMuWc86udma-320-80.jpg)
Researchers demonstrate how to install malware on iPhone after it's switched off
By Connor Jones published
News The most recent iPhones are found to be vulnerable after researchers discover an exploit in a beloved iOS 15 feature
Get the ITPro. daily newsletter
Receive our latest news, industry updates, featured resources and more. Sign up today to receive our FREE report on AI cyber crime & security - newly updated for 2024.