Vulnerabilities
-
ZuoRAT Can Take Over Widely Used SOHO Routers
Devices from Cisco, Netgear and others at risk from the multi-stage malware, which has been active since April 2020 and…
Read More » -
Leaky Access Tokens Exposed Amazon Photos of Users
Hackers with Amazon users’ authentication tokens could’ve stolen or encrypted personal photos and documents. The Amazon Photos app for Android…
Read More » -
Log4Shell Vulnerability Targeted in VMware Servers to Exfiltrate Data
CISA warns that threat actors are ramping up attacks against unpatched Log4Shell vulnerability in VMware servers. The Cybersecurity and Infrastructure…
Read More » -
Top Six Security Bad Habits, and How to Break Them
Shrav Mehta, CEO, Secureframe, outlines the top six bad habits security teams need to break to prevent costly breaches, ransomware…
Read More » -
Discovery of 56 OT Device Flaws Blamed on Lackluster Security Culture
Culture of ‘insecure-by-design’ security is cited in discovery of bug-riddled operational technology devices. Researchers discovered 56 vulnerabilities affecting devices from…
Read More » -
Gamification of Ethical Hacking and Hacking Esports
Joseph Carson, Chief Security Scientist and Advisory CISO at Delinea, explores why gamified platforms and hacking esports are the future.…
Read More » -
Voicemail Scam Steals Microsoft Credentials
Attackers are targeting a number of key vertical markets in the U.S. with the active campaign, which impersonates the organization…
Read More » -
Modern IT Security Teams’ Inevitable Need for Advanced Vulnerability Management
Traditional vulnerability management programs are outdated, with little to no innovation in the last two decades. Today’s dynamic IT environment…
Read More » -
Office 365 Config Loophole Opens OneDrive, SharePoint Data to Ransomware Attack
A reported a “potentially dangerous piece of functionality” allows an attacker to launch an attack on cloud infrastructure and ransom…
Read More » -
China-linked APT Flew Under Radar for Decade
Evidence suggests that a just-discovered APT has been active since 2013. Researchers have identified a small yet potent China-linked APT…
Read More »