A vulnerability found in websites’ cache infrastructure and content delivery networks can be used to spread malware, and an API vulnerability in Mozilla Firefox can be used to have partial control via plug-ins for a DDoS attack.
Server keys can be exposed due to proxy vulnerabilities in a popular development software program, making them prone to attacks and theft of sensitive information.
Vulnerabilities in the popular open-source management software Git could be abused to trawl contents of a repository memory and execute a code with a malicious hook.
Researchers reported that a bug in the Comcast website revealed a customer’s full address, Wi-Fi name and password, simply by entering the customer ID and a part of the subscription address.
A researcher found MEWKit targeting MyEtherWallet users in a phishing campaign, draining online wallets unnoticed through an automated transfer system, as well as getting their login and exchange credentials.
Attackers can extract messages from encrypted emails using the eFail attack, which exploits known vulnerabilities. Several of the most widely used email clients are affected.
Equifax submitted a report outlining the extent of the 2017 data breach of their systems, stating that hackers stole approximately 2.4 million PII and document scans.