Pro Lenovo patches ThinkPad, Yoga, IdeaPad UEFI secure boot vulnerability Mistakenly used drivers could allow hackers to modify the secure boot process 11 Nov
Pro GPS tracker exploit puts the world’s most high-value individuals in real-world danger Vulnerabilities in a GPS tracker used by governments, militaries, and Fortune 50 companies could be used to track the locations of high-value targets... 20 Jul
Pro 16-year-old flaw haunts millions of HP, Xerox and Samsung printers The severe vulnerability centres on a printer driver that installs itself on user’s machines, sometimes without their knowledge 22 Jul
Pro Half of all virtual appliances have outdated software and serious vulnerabilities Even security vendors can use outdated and vulnerable virtual appliances, new study shows 13 Oct
Pro Vulnerable drivers leave ATM and POS systems open to attack Newly discovered vulnerabilities could allow more persistent and destructive attacks on popular models 2 Jul
Pro Enterprise Internet attack surface is growing, report shows Attackers are taking advantage of the Covid-19 crisis to exploit pre-existing and newly introduced vulnerabilities across a wide range of attack... 11 Jun
Pro Install latest SAP Adaptive Server Enterprise patches, experts urge If left unpatched, these SAP ASE vulnerabilities could give attackers full control of databases and servers 4 Jun
Pro Kerberos authentication bypass impacts Cisco and Palo Alto Networks appliances The shared vulnerability could enable man-in-the-middle attacks, and it could exist on other devices. Patch now 15 May
Pro Attacks against Internet-exposed RDP servers surging during pandemic Reports show a dramatic increase in cyber-attacks that target open RDP ports as more people work remotely 11 May
Pro Cisco urges customers to patch critical UCS security holes now Posted several security warnings concerning authentication vulnerabilities in its Unified Computing System 16 Apr
Pro Intel CSME flaw is unpatchable, researchers warn Previously known flaw could allow attackers to compromise the cryptographic chain of trust in Intel systems 6 Mar
Pro Cisco security warnings include firewall holes, Nexus software weaknesses Detailed security vulnerability warnings with Firepower firewall, Unified Computing System software, Nexus switch operating system 27 Feb
Pro How to prevent scripting attacks in Microsoft Office Rise in phishing attempts requires another look at your Microsoft Office settings to minimise the risk of a user executing a malicious script 26 Feb
Pro Ireland most cybersecure country in Europe – report Machines in the Netherlands are most likely to encounter cybercrimes 25 Feb
Pro APIs are becoming a major target for credential stuffing attacks Attackers use APIs to automate credential stuffing attacks. The financial sector is particularly vulnerable 20 Feb
Pro One in three SMBs use free consumer cybersecurity Study revealed 20% of small to medium businesses use no endpoint security 20 Feb
Life Zigbee vulnerability lets hackers use Philips Hue bulbs to hijack your network But your Hue bridge has likely already patched itself 6 Feb
Pro Time for NSA to step up in Windows hacking fight Agency needs to show it has abandoned practices that unleashed WannaCry on the world 5 Feb
Pro WatchGuard: Equifax breach vulnerability surfaces as top network attack New research highlights an increase in malware and network attacks as zero-day malware accounts for 50% of all detections 12 Dec
Life Remote hackers can modify CPU voltage to steal secrets from Intel SGX enclaves By manipulating the voltage of Intel CPUs that use SGX, researchers can extract sensitive data, including full RSA encryption keys, from memory 11 Dec
Subscribers 0
Fans 0
Followers 0
Followers