“Too Much Information” Millions of Social Profiles Leaked by Chinese Data-Scrapers

A cloud misconfiguration by the Chinese social media management company SocialArks exposed 318 million records from [...]

“Deframed” Zend Framework Remote Code Execution Vulnerability Revealed

An untrusted deserialization vulnerability in the Zend Framework was disclosed this week. If exploited by [...]

The Critical Golang XML Parser Bug Can Cause SAML Authentication Bypass

How the Critical Golang XML parser bug cause SAML authentication bypass? Security researchers at Mattermost, [...]

Vulnerability Scanning and Penetration Testing – Know the Difference

There are a variety of different ways to assess the security integrity of the systems [...]

“Wormhole” Wormable Zero-Click Vulnerability in Microsoft Teams

A Security Engineer at Evolution Gaming has discovered a Cross-site Scripting (XSS) vulnerability on the [...]

“Dark tidings” Recent Oracle WebLogic vulnerability exploited by DarkIRC Malware

A Remote Code Execution vulnerability, in the Oracle WebLogic Server, was recently discovered. The Oracle [...]

How Much Does an ISO 27001 Certification Cost?

ISO 27001 is an internationally recognised standard for information security management systems (ISMS). It provides [...]

Google Services Weaponized to Bypass Security in Phishing

There was a spike in Phishing and business email compromises due to threat actors exploiting Google [...]

Top 5 Signs of Social Engineering Attacks

What are the Signs of a Social Engineering Attack and How Can You Prevent Them? [...]

Risk Crew