Home Vulnerabilities

Vulnerabilities

Viruses, Nightmares, patches, rewards and scammers [Podcast] – Naked Security

by Paul Ducklin  Learning from computer virus history.   The PrintNightmare saga continues.   Apple puts out a patch, but doesn’t say why.   Snitch on a crook and earn $10...

The ransomware risk management calculus is changing for OT, ICS and critical infrastructure

Paralysis is the worst possible state for businesses to find themselves in when faced with...

British man arrested in connection with Twitter mega-hack

Police in Spain have arrested a British man in connection with what many consider the worst hack in Twitter’s history. In July 2020, the...

HTA Files Distributed as Fake Chrome Patches for CVE-2021-30554

By Elmer Hernandez, Cofense Phishing Defense Center With new vulnerabilities come new updates and patches. Organizations have complex environments making it difficult to roll...

What Is the Principle of Least Privilege and How to Implement It?

The principle of least privilege (POLP), also named the “principle of least authority” (POLA) or “the principle of minimal privilege” (POMP), stands for...

Microsoft Issues Windows 10 Workaround Fix for ‘SeriousSAM’ Bug

A privilege elevation bug in Windows 10 opens all systems to attackers to access data and create new accounts on systems. Source link

Bitdefender Cybersecurity Blogs: News, Views and Insights

17 domains used in Business Email Compromise (BEC) scams have been seized by Microsoft's Digital Crimes Unit (DCU), following an investigation by the...

CVE-2021-36934: Windows Elevation of Privilege Vulnerability Alert

Recently, Microsoft has issued a risk notice for Windows privilege escalation vulnerability, the vulnerability number is CVE-2021-36934 with the CVSS score of 7.8....

Cisco Talos Intelligence Group – Comprehensive Threat Intelligence: Security implications of misconfigurations

        By Jaeson Schultz.When defenders regularly monitor their organization's Domain Name System (DNS) queries, they can often snuff out potential...

Beef up your ransomware defense with Cisco Secure Choice

Ransomware. Certainly not a new form of cybercrime, but one that has dominated mainstream headlines in recent months. High-profile cyberattacks on critical infrastructure...

Most Read

‘Critical Severity’ Warning for Malware Embedded in Popular JavaScript Library

Security responders are scrambling this weekend to assess the damage from crypto-mining malware embedded in an npm package (JavaScript library) that counts close...

Popular NPM Package Hijacked to Publish Crypto-mining Malware

The U.S. Cybersecurity and Infrastructure Security Agency on Friday warned of crypto-mining malware embedded in "UAParser.js," a popular JavaScript NPM library with over...