Security News

Google offers rewards for techniques that bypass their abuse, fraud, and spam systems
2018-08-16 15:41

Google is expanding its vulnerability reward program again: the company wants to be notified about techniques that allow third parties to successfully bypass their abuse, fraud, and spam systems....

Email Phishers Using New Way to Bypass Microsoft Office 365 Protections
2018-08-15 18:33

Phishing works no matter how hard a company tries to protect its customers or employees. Security researchers have been warning of a new phishing attack that cybercriminals and email scammers are...

Microsoft ADFS flaw allows attackers to bypass MFA safeguards
2018-08-14 23:19

A vulnerability (CVE-2018-8340) in Microsoft Active Directory Federation Services (ADFS) allows a second authentication factor for one account to be used for all other accounts in an organization,...

Vulnerability Could Allow Insider to Bypass CEO's Multi-Factor Authentication
2018-08-14 19:01

Vulnerability Allows a Second Factor for One Account to be Used for All Accounts in an Organization read more

Microsoft Flaw Allows Full Multi-Factor Authentication Bypass
2018-08-14 17:09

This is similar to taking a room key for a building and turning it into a skeleton key that works on every door in the building.

macOS Zero-Day Flaw Lets Hackers Bypass Security Using Invisible Mouse-Clicks
2018-08-13 16:33

Your Mac computer running the Apple's latest High Sierra operating system can be hacked by tweaking just two lines of code, a researcher demonstrated at the Def Con security conference on Sunday....

Researchers Reveal Bypass for Apple’s USB Restricted Mode
2018-07-10 13:36

Researchers released a workaround for Apple's USB Restricted Mode security feature the same day it was rolled out.

Email Phishers Using A Simple Way to Bypass MS Office 365 Protection
2018-06-19 20:18

Security researchers have been warning about a simple technique that cyber criminals and email scammers are using in the wild to bypass most AI-powered phishing detection mechanisms implemented by...

Phishers Use 'ZeroFont' Technique to Bypass Office 365 Protections
2018-06-19 15:27

Cybercriminals have been leveraging a technique that involves manipulating font sizes in an effort to increase the chances of their phishing emails bypassing the protections implemented by...

Bypass Glitch Allows Malware to Masquerade as Legit Apple Files
2018-06-12 17:26

Malware can to worm its way onto Macs thanks to a recently discovered code-signing bypass flaw.