News & Articles

 

Microsoft Outlook flaw opens door to 1-click remote code execution attacks

23 Feb 2024

Microsoft released its batch of monthly security updates this month covering 73 vulnerabilities, including two zero-day flaws exploited in the wild. While organizations should prioritize all critical and high-risk issues, there is one critical vulnerability in Outlook that researchers claim could open the door to trivial attacks that result in remote code execution.

Read More

Microsoft Confirms Windows Exploits Bypassing Security Features

19 Feb 2024

Microsoft on Tuesday rolled out a massive batch of security-themed software updates and called urgent attention to at least three vulnerabilities being exploited in live malware attacks. The world’s largest software maker documented 72 security vulnerabilities in the Windows ecosystem and warned users of the risk of remote code execution, security feature bypass, information disclosure and privilege escalation attacks.

Read More

FBI and CISA publish guide to Living off the Land techniques

13 Feb 2024

The Cybersecurity and Infrastructure Security Agency , National Security Agency , Federal Bureau of Investigation , and other authoring agencies have released a joint guidance about common living off the land techniques and common gaps in cyber defence capabilities.

Read More

AnyDesk says hackers breached its production servers, reset passwords

07 Feb 2024

AnyDesk confirmed today that it suffered a recent cyberattack that allowed hackers to gain access to the company's production systems. Researcher has learned that source code and private code signing keys were stolen during the attack. AnyDesk is a remote access solution that allows users to remotely access computers over a network or the internet. Certificates are usually not invalidated unless they have been compromised, such as being stolen in attacks or publicly exposed.

Read More

Top Security Posture Vulnerabilities Revealed

05 Feb 2024

Each New Year introduces a new set of challenges and opportunities for strengthening our cybersecurity posture. It's the nature of the field – the speed at which malicious actors carry out advanced persistent threats brings a constant, evolving battle for cyber resilience. The excitement in cybersecurity lies in this continuous adaptation and learning, always staying one step ahead of potential threats.

Read More