From the Blog

News
Michael

Android Bluetooth Critical RCE Flaw

A recent vulnerability was found by researchers from a German security firm. Fixes are available via the Android February 2020 Security Bulletin. The bug is identified as CVE-2020-002; when exploited can result in remote-code-execution without any user interaction with elevated privileges.

Read More »
Data Protection
Michael

WhatsApp? WhatsPatch? WhatsCrack? | WhatsApp Critical Flaw

A security researcher by the name of Gal Weizman from PerimeterX found multiple flaws within WhatsApp that could potentially lead to remote-code-execution (RCE). The flaws enabled vulnerabilities such as Open-Redirect, Persistent-XSS, CSP-Bypass and read privileges from the Local File System (LFS).

Read More »
Data Protection
Michael

Google Exposed Personal Photos

It has recently been reported that not long ago, last Thanksgiving, Google had a bug which caused personal photos to be shared to complete strangers. ‘The Chocolate Factory’ made note of this issue and began notifying users that there is a bug in Google Photos data-archiving tool, Takeout.

Read More »
Data Protection
Michael

Handout the CacheOut

A recent finding of a microarchitectural Data Sampling (MDS) vulnerability within Intel’s CPU’s found by researchers have now released a Proof-of-Concept (PoC) code. This was not the only recent vulnerability found; however, it is the most severe with a Medium risk vulnerability.

Read More »
News
Michael

Mistakes were Made | Intel Privilege Escalation

Intel is a very large corporation most known for their processors. A recent flaw within Intel’s ‘VTune Profiler’ software could enable anyone to upgrade their privileges if exploited correctly. This software is a performance monitoring & analysis application mainly used for serial and multi threaded application developers.

Read More »
News
Michael

New Year, New NSA | NSA Helping Microsoft?

Technology has been progressing faster and faster over the years. What was a critical vulnerability in 2005 is now a redundant memory in the security industry keeping a “gentle” reminder of how important security is in the cyber industry.

Read More »
Data Protection
Michael

Citrix is in Trouble…

Recent vulnerabilities found in Citrix ADC and Gateway are vulnerable to remote code execution which could potentially allow hackers to gain access to the services and control them. These Citrix services control application delivery, load balancing, and Gateway solutions.

Read More »
News
Thomas Wood

Trojan

If you’re unsure if your infrastructure is secure, then please contact us here at Hedgehog Security, and we’ll be more than happy to work with you to ensure that you’re not at risk from malicious threats.

Read More »
Scroll to Top