Latest News
Stay up to date with the latest posts and updates
Alerts
-
iPhones Vulnerable to Attack Even When Turned Off
Wireless features Bluetooth, NFC and UWB stay on even when the device is powered down, which could allow attackers to execute pre-loaded malware.
4 min read
-
Sysrv-K Botnet Targets Windows, Linux
Microsoft researchers say they are tracking a botnet that is leveraging bugs in the Spring Framework and WordPress plugins.
4 min read
-
Weak Security Controls and Practices Routinely Exploited for Initial Access
Original release date: May 17, 2022 The cybersecurity authorities of the United States, Canada, New Zealand, the Netherlands, and the United Kingdom have issued a joint Cybersecurity Advisory…
4 min read
-
AA22-137A: Weak Security Controls and Practices Routinely Exploited for Initial Access
Original release date: May 17, 2022 Summary Best Practices to Protect Your Systems: • Control access. • Harden Credentials. • Establish centralized log management. • Use antivirus solutions.…
4 min read
-
Vulnerability Summary for the Week of May 9, 2022
Original release date: May 16, 2022 High Vulnerabilities Primary Vendor — Product Description Published CVSS Score Source & Patch Info adobe — photoshop Adobe Photoshop versions 22.5.6…
4 min read
-
Microsoft’s May Patch Tuesday Updates Cause Windows AD Authentication Errors
Microsoft’s May Patch Tuesday update is triggering authentication errors.
4 min read