exploits

What is WannaCry?
Somebody sitting at their desk in front of various devices that have been locked by WannaCry
WannaCry

What is WannaCry?

The full story behind one of the worst ransomware outbreaks in history
4 Feb 2021
Researcher discovers hidden iOS 14 ‘BlastDoor’ security mechanism
An iPhone user texting using the iMessage app
iOS

Researcher discovers hidden iOS 14 ‘BlastDoor’ security mechanism

This protective layer sandboxes incoming iMessages to protect users from malicious texts
29 Jan 2021
Hackers are actively exploiting three Apple iOS flaws
The iPhone 12 showing the password screen on a coffee table beside a cup and saucer
exploits

Hackers are actively exploiting three Apple iOS flaws

Apple releases fixes for privilege escalation and remote code execution bugs in iOS, iPadOS and tvOS
27 Jan 2021
Weekly threat roundup: SAP, Windows 10, Chrome
Graphic showing a red unlocked padlock surrounded by blue locked padlocks
vulnerability

Weekly threat roundup: SAP, Windows 10, Chrome

Pulling together the most dangerous and pressing flaws that businesses need to patch
21 Jan 2021
Weekly threat roundup: Solarwinds, HPE, and PostgreSQL
Graphic showing a red unlocked padlock surrounded by blue locked padlocks
Security

Weekly threat roundup: Solarwinds, HPE, and PostgreSQL

Pulling together the most dangerous and pressing flaws that businesses need to patch
17 Dec 2020
Weekly threat roundup: Microsoft Teams, VMware and QNAP NAS drives
Graphic showing a red unlocked padlock surrounded by blue locked padlocks
Security

Weekly threat roundup: Microsoft Teams, VMware and QNAP NAS drives

Pulling together the most dangerous and pressing flaws that businesses need to patch
10 Dec 2020
What is hacktivism?
Two masked members of Anonymous demonstrating during the Occupy protest on October 15, 2011 in The Hague
hacking

What is hacktivism?

From Anonymous to Omega, here’s everything you need to know about hackers with a conscience
9 Dec 2020
Weekly threat roundup: VMware, GitHub, Facebook, and MobileIron
Graphic showing a red unlocked padlock surrounded by blue locked padlocks
Security

Weekly threat roundup: VMware, GitHub, Facebook, and MobileIron

Pulling together the most dangerous and pressing flaws that businesses need to patch
26 Nov 2020
Weekly threat roundup: Cisco, BlueKeep, Apache Unomi
Graphic showing a red unlocked padlock surrounded by blue locked padlocks
Security

Weekly threat roundup: Cisco, BlueKeep, Apache Unomi

Pulling together the most dangerous and pressing flaws that businesses need to patch
19 Nov 2020
Microsoft patches actively exploited Windows Kernel flaw
An image of a bandaid as a metaphor for a vulnerability patch
vulnerability

Microsoft patches actively exploited Windows Kernel flaw

The patch is one of 112 issued in November's Patch Tuesday
11 Nov 2020
Weekly threat roundup: NHS COVID-19 app, Nvidia, and Oracle
Graphic showing a red unlocked padlock surrounded by blue locked padlocks
Security

Weekly threat roundup: NHS COVID-19 app, Nvidia, and Oracle

Pulling together the most dangerous and pressing flaws that businesses need to patch
30 Oct 2020
Weekly threat roundup: Chrome, Citrix and WordPress
Graphic showing a red unlocked padlock surrounded by blue locked padlocks
Security

Weekly threat roundup: Chrome, Citrix and WordPress

Pulling together the most dangerous and pressing flaws that businesses need to patch
23 Oct 2020
Microsoft releases two emergency Windows patches
The Windows 10 operating system shown on a portion of the display of a laptop
Security

Microsoft releases two emergency Windows patches

Windows Codecs Library and Visual Studio Code are afflicted with remote code execution flaws
19 Oct 2020
Weekly threat roundup: Windows 10, Adobe, and SonicWall VPNs
Graphic showing a red unlocked padlock surrounded by blue locked padlocks
Security

Weekly threat roundup: Windows 10, Adobe, and SonicWall VPNs

The most dangerous and pressing cyber security exploits from the week gone by
16 Oct 2020
Microsoft fixes 'critical' wormable RCE flaw in Windows 10
Person types on laptop in the dark
Security

Microsoft fixes 'critical' wormable RCE flaw in Windows 10

The latest Patch Tuesday release sees 87 bugs fixed including the CVSS 9.8-rated vulnerability
14 Oct 2020
Microsoft warns 'Zerologon' Windows Server bug being exploited by hackers
Ones and zeros traveling towards darkness
exploits

Microsoft warns 'Zerologon' Windows Server bug being exploited by hackers

The tech giant is 'actively tracking' threat actors using the exploit to access domain controllers
25 Sep 2020
How to install Kali Linux on Raspberry Pi
Security

How to install Kali Linux on Raspberry Pi

Follow these simple steps to install the penetration testing software on the compact computer for mobile hacking
22 Sep 2020
Windows Server flaw sparks emergency US gov warning
vulnerability

Windows Server flaw sparks emergency US gov warning

All government agencies had four days to patch their systems against a CVSS 10-rated elevation of privilege flaw
21 Sep 2020
Bluetooth advocacy group warns of critical encryption exploit
vulnerability

Bluetooth advocacy group warns of critical encryption exploit

The vulnerability allows third-parties to overwrite the key used to establish a link between two devices
11 Sep 2020
Cisco warns of memory exploitation in router software
vulnerability

Cisco warns of memory exploitation in router software

Attempts to exploit the vulnerability in the wild were first detected last week
1 Sep 2020
SAP patches critical flaw that lets hackers seize control of servers
SAP logo
vulnerability

SAP patches critical flaw that lets hackers seize control of servers

The rare 10/10 vulnerability on the CVSS scale affects a host of apps including ERP and CRM platforms
14 Jul 2020
VMware Cloud Director exploit lets hackers seize corporate servers
VMware
exploits

VMware Cloud Director exploit lets hackers seize corporate servers

A simple form submission could have been manipulated to gain control of virtual machines with the cloud service
2 Jun 2020
The top ten most-commonly exploited vulnerabilities revealed
A concept image of a hacker behind a stream of binary
vulnerability

The top ten most-commonly exploited vulnerabilities revealed

Flaws in Microsoft’s OLE technology are at the heart of some of the most widely-used attacks since 2016
13 May 2020