exploits

Weekly threat roundup: Cisco, BlueKeep, Apache Unomi
Graphic of a red unlocked padlock surrounded by smaller blue locked padlocks
Security

Weekly threat roundup: Cisco, BlueKeep, Apache Unomi

Pulling together the most dangerous and pressing flaws that businesses need to patch
19 Nov 2020
Microsoft patches actively exploited Windows Kernel flaw
An image of a bandaid as a metaphor for a vulnerability patch
vulnerability

Microsoft patches actively exploited Windows Kernel flaw

The patch is one of 112 issued in November's Patch Tuesday
11 Nov 2020
Weekly threat roundup: NHS COVID-19 app, Nvidia, and Oracle
Graphic of a red unlocked padlock surrounded by smaller blue locked padlocks
Security

Weekly threat roundup: NHS COVID-19 app, Nvidia, and Oracle

Pulling together the most dangerous and pressing flaws that businesses need to patch
30 Oct 2020
Weekly threat roundup: Chrome, Citrix and WordPress
Graphic of a red unlocked padlock surrounded by smaller blue locked padlocks
Security

Weekly threat roundup: Chrome, Citrix and WordPress

Pulling together the most dangerous and pressing flaws that businesses need to patch
23 Oct 2020
Microsoft releases two emergency Windows patches
The Windows 10 operating system shown on a portion of the display of a laptop
Security

Microsoft releases two emergency Windows patches

Windows Codecs Library and Visual Studio Code are afflicted with remote code execution flaws
19 Oct 2020
Weekly threat roundup: Windows 10, Adobe, and SonicWall VPNs
Graphic of a red unlocked padlock surrounded by smaller blue locked padlocks
Security

Weekly threat roundup: Windows 10, Adobe, and SonicWall VPNs

The most dangerous and pressing cyber security exploits from the week gone by
16 Oct 2020
Microsoft fixes 'critical' wormable RCE flaw in Windows 10
Person types on laptop in the dark
Security

Microsoft fixes 'critical' wormable RCE flaw in Windows 10

The latest Patch Tuesday release sees 87 bugs fixed including the CVSS 9.8-rated vulnerability
14 Oct 2020
What is hacktivism?
hacking

What is hacktivism?

From Anonymous to Omega, here’s everything you need to know about hackers with a conscience
13 Oct 2020
What is WannaCry?
WannaCry

What is WannaCry?

The full story behind one of the worst ransomware outbreaks in history
12 Oct 2020
Microsoft warns 'Zerologon' Windows Server bug being exploited by hackers
Ones and zeros traveling towards darkness
exploits

Microsoft warns 'Zerologon' Windows Server bug being exploited by hackers

The tech giant is 'actively tracking' threat actors using the exploit to access domain controllers
25 Sep 2020
How to install Kali Linux on Raspberry Pi
Security

How to install Kali Linux on Raspberry Pi

Follow these simple steps to install the penetration testing software on the compact computer for mobile hacking
22 Sep 2020
Windows Server flaw sparks emergency US gov warning
vulnerability

Windows Server flaw sparks emergency US gov warning

All government agencies had four days to patch their systems against a CVSS 10-rated elevation of privilege flaw
21 Sep 2020
Bluetooth advocacy group warns of critical encryption exploit
vulnerability

Bluetooth advocacy group warns of critical encryption exploit

The vulnerability allows third-parties to overwrite the key used to establish a link between two devices
11 Sep 2020
Cisco warns of memory exploitation in router software
vulnerability

Cisco warns of memory exploitation in router software

Attempts to exploit the vulnerability in the wild were first detected last week
1 Sep 2020
SAP patches critical flaw that lets hackers seize control of servers
SAP logo
vulnerability

SAP patches critical flaw that lets hackers seize control of servers

The rare 10/10 vulnerability on the CVSS scale affects a host of apps including ERP and CRM platforms
14 Jul 2020
VMware Cloud Director exploit lets hackers seize corporate servers
VMware
exploits

VMware Cloud Director exploit lets hackers seize corporate servers

A simple form submission could have been manipulated to gain control of virtual machines with the cloud service
2 Jun 2020
The top ten most-commonly exploited vulnerabilities revealed
A concept image of a hacker behind a stream of binary
vulnerability

The top ten most-commonly exploited vulnerabilities revealed

Flaws in Microsoft’s OLE technology are at the heart of some of the most widely-used attacks since 2016
13 May 2020
Microsoft products targeted by most widely-used exploits in 2019
exploits

Microsoft products targeted by most widely-used exploits in 2019

Eight of the top ten exploitable flaws targeted Microsoft software, in addition to two Adobe Flash Player vulnerabilities
7 Feb 2020
Genetics startup Veritas rocked by data breach
Security

Genetics startup Veritas rocked by data breach

Customer information has been stolen from the DNA-screening company
8 Nov 2019
Tenable: There are far more dangerous threats than zero-days
Zero-day exploit
Security

Tenable: There are far more dangerous threats than zero-days

‘If you’re scared of zero-days, you don’t know what you’re talking about’ claims Tenable
7 Nov 2019
First mass BlueKeep exploitation spotted in the wild
Networks connected with each other across the world
Security

First mass BlueKeep exploitation spotted in the wild

Amateurish coin mining attack discovered six months after the critical Microsoft vulnerability was discovered
4 Nov 2019
Is cyber security about to go interstellar?
Virgin Galactic
Security

Is cyber security about to go interstellar?

When we think about the cyber attacks of the future, we may have to think bigger
30 Oct 2019
Humans 'unfit' to handle access managment, say Goldman Sachs
Security

Humans 'unfit' to handle access managment, say Goldman Sachs

Privileged access management is rarely done well and humans are usually the issue
29 Oct 2019