English News

NSA says it found new critical vulnerabilities in Microsoft Exchange Server

NSA says it found new critical vulnerabilities in Microsoft Exchange Server

The National Security Agency on Tuesday said it alerted Microsoft to a fresh batch of critical vulnerabilities that hackers could exploit to remotely compromise the […]
Microsoft Patch Tuesday, April 2021 Edition

Microsoft Patch Tuesday, April 2021 Edition

Microsoft today released updates to plug at least 110 security holes in its Windows operating systems and other products. The patches include four security fixes […]
2021: Volumetric DDoS Attacks Rising Fast

2021: Volumetric DDoS Attacks Rising Fast

In our 2020 DDoS retrospective, we highlighted the twists and turns of a very, very active threat landscape. As a quick refresher, we mitigated some […]
Google Android April 2021 Security Patch Vulnerabilities: Discover and Take Remote Response Action Using VMDR for Mobile Devices

Google Android April 2021 Security Patch Vulnerabilities: Discover and Take Remote Response Action Using VMDR for Mobile Devices

The recently released Android Security Bulletin for April 2021 addresses 36 vulnerabilities, out of which 2 are rated as critical vulnerabilities. The vulnerabilities affect open-source […]
VIPRE streamlines the business security journey with new defence bundles

VIPRE streamlines the business security journey with new defence bundles

VIPRE UK and Ireland today announces the release of its latest cybersecurity defence bundles – providing businesses with protection at their core, edge or across […]
Updates on Microsoft Exchange Server Vulnerabilities

Updates on Microsoft Exchange Server Vulnerabilities

CISA has added two new Malware Analysis Reports (MARs) to Alert AA21-062A: Mitigate Microsoft Exchange Server Vulnerabilities. MAR-10331466-1.v1: China Chopper Webshell identifies a China Chopper […]
NAME:WRECK vulnerabilities impact millions of smart and industrial devices

NAME:WRECK vulnerabilities impact millions of smart and industrial devices

Security researchers have found a new set of vulnerabilities that impact hundreds of millions of servers, smart devices, and industrial equipment. Called NAME:WRECK, the vulnerabilities have […]
Microsoft: Malware gang uses website contact forms for distribution

Microsoft: Malware gang uses website contact forms for distribution

Microsoft said today it spotted a cybercrime operation abusing contact forms on legitimate websites to target companies and their workers in attempts to infect them […]
2021 Industry Cyber-Exposure (ICER): Fortune 500 Report

2021 Industry Cyber-Exposure (ICER): Fortune 500 Report

Executive Summary As the world’s knowledge workers were driven home amid a pandemic and cases of ransomware ran rampant across the internet, measuring the world’s […]
Using Aviary to Analyze Post-Compromise Threat Activity in M365 Environments

Using Aviary to Analyze Post-Compromise Threat Activity in M365 Environments

Aviary is a new dashboard that CISA and partners developed to help visualize and analyze outputs from its Sparrow detection tool released in December 2020. […]
Visa Describes New Skimming Attack Tactics

Visa Describes New Skimming Attack Tactics

Visa’s Payment Fraud Disruption team reports that cybercriminals are increasingly using web shells to establish command and control over retailers‘ servers during payment card skimming […]
SAP and Onapsis Proactively Notify and Help Customers Protect Mission-Critical Applications from Active Cyber Threats

SAP and Onapsis Proactively Notify and Help Customers Protect Mission-Critical Applications from Active Cyber Threats

SAP and Onapsis today jointly released a cyber threat intelligence report providing actionable information on how malicious threat actors are targeting and potentially exploiting unprotected […]
Procurement Guidelines for Cybersecurity in Hospitals: New Online tool for a Customised Experience!

Procurement Guidelines for Cybersecurity in Hospitals: New Online tool for a Customised Experience!

The new tool helps healthcare organisations identify best practices in order to meet cybersecurity needs when procuring products or services. To facilitate the use of […]
What Really Caused Facebook’s 500M-User Data Leak?

What Really Caused Facebook’s 500M-User Data Leak?

Since Saturday, a massive trove of Facebook data has circulated publicly, splashing information from roughly 533 million Facebook users across the internet. The data includes […]
Emerging hacking tool ‚EtterSilent‘ mimics DocuSign, researchers find

Emerging hacking tool ‚EtterSilent‘ mimics DocuSign, researchers find

Hackers are using a new, malleable malicious document builder to run their criminal schemes, according to Intel 471 research published Tuesday. The document builder, known […]
SAP Bugs Under Active Cyberattack, Causing Widespread Compromise

SAP Bugs Under Active Cyberattack, Causing Widespread Compromise

Cyberattackers are actively exploiting known security vulnerabilities in widely deployed, mission-critical SAP applications, allowing for full takeover and the ability to infest an organization further. […]