Title Published Date System Number of Articles Actions
iOS VPN Bypass Vulnerability in Apple Devices. 2022-08-19 1. iOS VPN functionality on Apple's iOS devices, specifically versions starting from at least iOS 13.3.1 [131224] 2. ProtonVPN's app on iOS devices [131224] 3. Kill Switch function in ProtonVPN [131224] 4. Airplane Mode functionality on iOS devices [131224] 5. OVPN app running the WireGuard protocol on iOS devices [131224] 1 View Details
Security Vulnerabilities Discovered in Google Pixel 6 Firmware. 2022-08-10 1. Boot loader in Pixel 6 firmware [131216] 2. Titan M2 security chip in Pixel 6 [131216] 1 View Details
Zoom's Automatic Update Feature Vulnerabilities Lead to Total Control 2022-08-12 1. Zoom's automatic update feature validation checks for updates [131219, 132593] 2. Cryptographic signature check in Zoom's automatic update feature [131219, 132593] 3. Zoom's updater.app tool for update distribution [131219, 132593] 4. Zoom's installer allowing injection of malicious software during the update process [131219] 2 View Details
VistA Encryption Vulnerability in U.S. Department of Veterans Affairs 2022-08-13 1. VistA (Veterans Information Systems and Technology Architecture) - the electronic medical records platform used by the U.S. Department of Veterans Affairs [131215]. 1 View Details
Twitter's Security Vulnerabilities and Privacy Failures Leading to National Security Risks 2022-08-23 1. Twitter's security practices and architecture [131222, 130996] 2. Twitter's data center servers with outdated software and lacking encryption [131222, 130996] 3. Lack of comprehensive development or testing environments for new features and system upgrades at Twitter [131222] 4. Twitter's handling of user data, including not deleting data of users who leave the platform as required [130996] 5. Twitter's misleading information about spam accounts and security vulnerabilities [130996] 6. Twitter's potential vulnerability to foreign exploitation and presence of foreign spies on its payroll [130996] 7. Twitter's violations of commitments to the FTC regarding user data handling and cybersecurity practices [130996] 2 View Details
Tractor Hacking Incident at DefCon 2022: Security Vulnerabilities Exposed 2022-08-13 1. John Deere tractor control touchscreen consoles, including models 2630 and 4240, failed due to vulnerabilities exploited by Sick Codes [131208]. 1 View Details
Vulnerabilities in Emergency Alert System Software Allow Fake Messages Broadcasting 2022-08-03 1. Emergency Alert System (EAS) devices running unpatched and unsecured software [131240] 1 View Details
Decentralized Robbery: Nomad's Bridge Exploit Results in $190M Loss 2022-08-02 1. Nomad's bridge smart contract system [131333] 1 View Details
Insecure Development Practices Lead to Data Leaks in Mobile Apps 2022-09-01 1. Mobile app cloud infrastructure 2. Hard-coded authentication credentials 3. Amazon Web Services credentials 4. Third-party AI digital identity software development kit 1 View Details
Tesla Autopilot Confusion with Horse-Drawn Carriage Incident. 2022-08-18 1. Tesla's self-driving system [131017] 1 View Details