• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
weekly threat roundup: microsoft teams, ios, samsung galaxy

Weekly threat roundup: Microsoft Teams, iOS, Samsung Galaxy

You are here: Home / General Cyber Security News / Weekly threat roundup: Microsoft Teams, iOS, Samsung Galaxy
June 17, 2021

Shutterstock

Patch management is much less complicated reported than accomplished, and security groups may possibly typically be compelled into prioritising fixes for various company-critical units, all unveiled at when. It is turn into typical, for instance, to expect dozens of patches to be introduced on Microsoft’s Patch Tuesday, with other suppliers also routinely finding in on the act.

Under, IT Pro has collated the most urgent disclosures from the past seven days, which include particulars this sort of as a summary of the exploit system, and whether or not the vulnerability is becoming exploited in the wild. This is in purchase to give teams a perception of which bugs and flaws may well pose the most risky immediate security risks.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Zero-day allowed hackers to steal documents from Microsoft Teams

A vulnerability in the Microsoft Ability Apps company on Microsoft Teams can be exploited by an attacker to obtain persistent read through/publish accessibility to a victim’s email, Teams chats, OneDrive storage, Sharepoint, and a host of other companies.

The side-server vulnerability, which has now been patched, affects Electric power Applications, a support that will allow companies to build specific use-scenarios on Microsoft goods to accommodate their have demands.

These applets would manifest as tabs. Hackers could exploit the flaw by placing up a destructive tab, which when opened by the sufferer, would grant them entry to non-public communications and information.

The attacker could also disguise by themselves as a sufferer and ship e-mail and messages on their behalf, in accordance to Even Grant, a investigate engineer at Tenable, making it possible for them to perform even more social engineering attacks. 

Hackers exploit WebKit Engine flaws in iOS 

Apple produced an emergency update for iOS 12 this 7 days following revealing that hackers experienced exploited two zero-working day flaws to launch distant code execution attacks on devices hosting the operating procedure.

The flaws, tracked as CVE-2021-30761 and CVE-2021-30762, lie in the open source WebKit browser rendering motor. This is utilised to power the Safari web browser, as properly as several iOS, macOS, watchOS, and Apple Tv applications and products and services.

The initially is a memory corruption issue, even though the 2nd is a use-after-cost-free bug, and they have been fixed with “improved state management” and “improved memory management” respectively in iOS 12.5.3.

These are just the most current flaws to have an effect on the WebKit browser engine that hackers have efficiently exploited since the start of the year. In total, Apple has patched 7 WebKit-linked flaws considering the fact that January 2021.

Supply chain bug in connected cameras 

A widely applied program progress package (SDK) in IoT-enabled cameras, produced by ThroughTek, is embedded with a flaw that has uncovered swathes of industrial components to potential cyber attacks.

The vulnerability in ThroughTek’s P2P SDK, which is utilized to supply remote obtain to audio or video clip feeds more than the internet, can grant hackers obtain to media feeds as perfectly as delicate data. Cyber criminals could also exploit the flaw, rated 9.1 out of 10 on the CVSS danger severity scale, to spoof gadgets and hijack their certificates. 

The susceptible SDK is employed by many digital camera sellers and is deployed in numerous CCTV techniques, as well as IoT units like baby monitors. Nozomi Networks scientists found the flaw, and documented it to ThroughTek in line with the firm’s disclosure coverage. 

Even though ThroughTek has up to date its SDK to clear away the flaw, IoT units made by buyers that have not updated their SDKs will nevertheless be vulnerable. The severity of the bug, and likelihood of exploitation, has prompted the US Cybersecurity & Infrastructure Company (CISA) to issue an notify to companies with steering on how to mitigate versus attacks.

Samsung telephones susceptible to takeover

Pre-set up apps bundled with Samsung Galaxy smartphones had been embedded with 7 vulnerabilities that could have authorized hackers to access delicate data and just take about management of the machine.

The seven flaws, found out by Oversecured, were uncovered in Knox Core, Managed Provisioning, Safe Folder, SecSettings, Samsung DeX Technique UI, Telephony UI, and PhotoTable. If exploited the bugs could allow cyber criminals to edit contacts, phone calls, and textual content messages, even though breaching an unpatched system could also permit hackers put in malicious applications with administrative rights, and modify the device’s default configurations.

Samsung up-to-date the software program for all affected applications, which users need to use as before long as probable if they have not finished so already, while the agency wouldn’t reveal which equipment could be exploited.


Some areas of this article are sourced from:
www.itpro.co.uk

Previous Post: «Cyber Security News Amazon Web Services Misconfiguration Exposes Half a Million Cosmetics Customers
Next Post: Australia internet banking outage blamed on DDoS mitigation service australia internet banking outage blamed on ddos mitigation service»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.