Category Archives: Cybersecurity
Workaround For One-Click 0Day Vulnerability Follina
Microsoft announced its workaround for a zero-day vulnerability that has already been used by hackers. A threat actor already has exploited the vulnerability to target organizations in Russia and Tibet, researchers said. This vulnerability was identified back in April and is dubbed ‘Follina’. Microsoft’s own tool reported a flaw in the way it handled remote…
Snake Keylogger Spreads Through Malicious PDFs: A Comprehensive Analysis
Discover how the Snake Keylogger malware spreads through malicious PDFs in a comprehensive analysis of its tactics and evasion techniques
Increase Your Cyber Security Resilience
Increase Your Cyber Security Resilience because cyberattacks can come from any direction. They can paralyze an entire company.
Synology And QNAP Critical Netatalk Vulnerability
Synology and QNAP has warned its customers that it has found serious vulnerabilities in its NAS devices. The flaws, which exist in its network-attached storage (NAS) appliances, could allow attackers to gain remote access to vulnerable systems, modify data or execute malicious code. QNAP, urged its users to disable their NAS devices’ AFP file service…
Bank Account Takeover Is Rising
Cybercriminals keep using account takeover to trick account holders into giving them access to their bank accounts. Bank account takeover is especially lucrative for hackers because of the potential to steal money from the accounts. As most researchers and financial executives can attest, cybercriminals have increasingly used account takeover, which is more popular than most…
Vulnerability in Spring Java framework called Spring4Shell
Spring4Shell CVE-2022-22965, a critical vulnerability has been found in Spring, an open source programming framework for the Java platform. It could allow hackers to take control of your system. Details about the vulnerability were leaked to the public before the patch was released. Fortunately, only a small number of users have been affected. The VMware…
Cyber Security Steps To Protect Your Company
Ransomware attacks rose again. The number of ransomware families rose from 143 to 157 in just one year. This means that the frequency and severity of attacks is still increasing. Ransomware attacks are up over last quarter, over the previous year, and up over the last three years. The cybersecurity report you just read found…
OpenSSL Infinite Loop Vulnerability
The US National Security Agency (NSA) officials have recently discovered a vulnerability in the OpenSSL cryptographic library. This vulnerability can be used to conduct denial-of-service attacks and can be easily weaponized by its potential attackers. OpenSSL is a popular cryptography library used to encrypt data and verify digital signatures. The bug affects the BN_mod_sqrt() function,…
APC Smart UPS Zero Day Vulnerability
Three critical Zero Day vulnerabilities have been uncovered in popular uninterruptible power supply APC-SMART UPS devices. They could be exploited and used to bring down infrastructure and even cause physical harm. A malicious actor could exploit these flaws and cause severe service disruptions, data loss, and even lead to a potential injury. Researchers from Armis…
Top 5 Cybersecurity Predictions For 2022
This is tough to predict however I think we’ll see a lot of interesting developments for 2022. And they’ll be related to all the challenges and problems we’ve seen in the past. Cybersecurity is a long, hard-fought war between cybercriminals and businesses. Who will make the most progress in this domain? I think it’ll be…