Microsoft – Workaround Releases for ‘One-Click’ 0 Day Under Active Attack!
Microsoft has released a workaround for a zero-day flaw that was 1st flagged-up in April & that attackers already have used to target organisations in Russia &
Microsoft has released a workaround for a zero-day flaw that was 1st flagged-up in April & that attackers already have used to target organisations in Russia &
The rise of remote work & learning opened new opportunities for many people – as seen by the people who have moved to unfamiliar places
Malware loads itself from remote servers & bypasses Microsoft’s Defender AV scanner, according to reports. A zero-day vulnerability in Microsoft Office allows adversaries to run
Critical issues in a popular platform used by Industrial Control Systems (ICS) that allow for unauthorised device access, Remote Code Execution (RCE) or denial of
2022’s DBIR, in addition, highlighted the far-reaching impact of supply-chain breaches & how organisations & their employees are the reasons why incidents occur. Ransomware, supply-chain
The Google Project Zero Security Researcher Ivan Fratric noted in a report that an attacker can exploit a victim’s machine over a zoom chat. The bug, tracked
A fresh look at the Fronton DDoS-focused botnet shows the criminal tool has more capabilities than previously believed. The Fronton botnet 1st made the headline
Whilst most malicious e-mail campaigns use Word documents to hide & spread malware, a recently discovered campaign uses a malicious PDF file, & a 22-year-old
In excess of 380,000 Kubernetes API servers allow some kind of access to the public internet, making the popular open-source container-orchestration engine for managing cloud
A ‘critical privilege escalation’ issue found in 2 themes used by over 90,000 WordPress sites can allow threat players to take over the sites completely,
Attackers can target iPhones even when they are turned off, due to how Apple implements standalone wireless features Bluetooth, Near Field Communication (NFC ) & Ultra-wideband (
Cyber-criminals are promoting a new, modular malware-as-a-service offering that allows would-be attackers to choose from a number of threats via a Telegram channel that so far has