With the shift towards work from home, there has been an influx of new threats, technologies, and business models. Businesses who operate in the online world know that the technology landscape is constantly changing, and enhancing the security within the firm has...
If you are not living under the rock, you will be aware of the cyber security incidents that have created havoc in the business world. Many people think cyber security is a concern for big businesses only; however, hackers don’t look at the firm’s...
-Microsoft Security Updates – December 2021: Microsoft issued fixes for 67 vulnerabilities in a variety of products in today’s security release, including a fix for Windows Defender for IoT, which is vulnerable to CVE-2021-44228 and seven other...
Khonsari Ransomware Deployed by the Log4Shell Vulnerability; A new ransomware family named Khonsari which targets Windows servers has been recently discovered utilizing Log4shell vulnerability to deploy itself. The exploit loads the Java bytecode at...
Many organizations, irrespective of their size and the industry they belong to, are exposed to cybersecurity threats. With the ongoing digitization in the business world and dependence on customer data, the chances of cyber security threat increases. Cybercriminals...
This is to notify you of the Log4j2 Vulnerability (CVE-2021-42288) that is being exploited in wild. Below is a brief summary of this Vulnerability. -Log4j2 Vulnerability Summary: This exploit makes use of the Apache Log4j2 framework. An attacker injects a Remote code...
Researchers found a set of 13 new vulnerabilities affecting the Nucleus TCP/IP stack, which we are collectively calling NUCLEUS:13. The new vulnerabilities allow for remote code execution, denial of service, and information leak. Nucleus is currently owned by Siemens...
2 December 2021, Bad Homburg – Nine well-known Wi-Fi routers were recently put through a rigorous security test in a lab setting, with shocking results in the world of IT security: A total of 226 potential security flaws were discovered in millions of devices from...
When we hear the word hacking, we picture a person busy operating in a dark room, working on big machines surrounded by bully racks and blinking lights. Thanks to the high-tech Hollywood movies, hackers have gained a bad reputation. But, trust us, ethical hacking is a...
Personal data can be accessed on the internet via so-called XS-Leaks. A large number of browsers are affected. Cross-site leaks, or XS-Leaks, are 14 new types of attacks against web browsers uncovered by IT security specialists. A rogue website can use XS-Leaks to...