-Microsoft Security Updates – December 2021: Microsoft issued fixes for 67 vulnerabilities in a variety of products in today’s security release, including a fix for Windows Defender for IoT, which is vulnerable to CVE-2021-44228 and seven other...
Khonsari Ransomware Deployed by the Log4Shell Vulnerability; A new ransomware family named Khonsari which targets Windows servers has been recently discovered utilizing Log4shell vulnerability to deploy itself. The exploit loads the Java bytecode at...
This is to notify you of the Log4j2 Vulnerability (CVE-2021-42288) that is being exploited in wild. Below is a brief summary of this Vulnerability. -Log4j2 Vulnerability Summary: This exploit makes use of the Apache Log4j2 framework. An attacker injects a Remote code...
Researchers found a set of 13 new vulnerabilities affecting the Nucleus TCP/IP stack, which we are collectively calling NUCLEUS:13. The new vulnerabilities allow for remote code execution, denial of service, and information leak. Nucleus is currently owned by Siemens...
2 December 2021, Bad Homburg – Nine well-known Wi-Fi routers were recently put through a rigorous security test in a lab setting, with shocking results in the world of IT security: A total of 226 potential security flaws were discovered in millions of devices from...
When we hear the word hacking, we picture a person busy operating in a dark room, working on big machines surrounded by bully racks and blinking lights. Thanks to the high-tech Hollywood movies, hackers have gained a bad reputation. But, trust us, ethical hacking is a...
Personal data can be accessed on the internet via so-called XS-Leaks. A large number of browsers are affected. Cross-site leaks, or XS-Leaks, are 14 new types of attacks against web browsers uncovered by IT security specialists. A rogue website can use XS-Leaks to...
With the increased focus on ransomware attacks and cyber-physical systems, more businesses are giving priority to risk leaders and security. After the pandemic, there was an increase in the number of cyber-attacks. Ransomware attacks make networks more vulnerable,...
The majority of prior versions of ATMs were vulnerable to black-box assaults. In such attacks, a hacker connects to the ATM via a computer or a mobile device and transmits a particular code to the ATM, causing it to disburse money. According to a 2018 study by...