
Remote Code Execution Discovered in Cisco Security Manager
Multiple security advisories related to critical flaws in the Cisco Security Manager product have been [...]
Mismanagement: Flaws in Privileged Management Apps Expose Machines to Attack
The Intel Support Assistant utility was found to be vulnerable to privilege escalation through file [...]
Secure Your SME to Detour Hacker Attacks
It is estimated that six in ten SMEs that suffer a breach are likely to [...]
“Through The Cracks” NAT/Firewall Bypass Lets Hackers Access Any TCP/UDP Service
Security researcher, Samy Kamkar, has discovered a technique that allows an attacker to bypass NAT/Firewall [...]
Hot seat – Hotspot Shield VPN New Privilege Escalation Vulnerability
A high-risk vulnerability, rated as 7.8 in CVSS v3.1, affecting Windows 10.3.0 and earlier exists [...]
Data Protection Steps Required as the Brexit Transition Ends
After 30th December 2020, the Brexit transition period will end. This has implications for the [...]
Netlogon Elevation of Privilege Vulnerability
The Zero logon flaw is not new but can still pose a risk to organisations [...]
A Flaw in the Windows TCP/IP Protocol Stack
A flaw in the Windows TCP/IP protocol stack implementation has been discovered, this is related [...]
“Playing Leapfrog” Default Password Usage Allows for Jfrog Artifactory Account Compromise
Jfrog Artifactory is a DevOps solution that aims to provide automation throughout an application delivery [...]
T2 Security Chip in Mac a Computer Contains an “Unpatchable” Vulnerability
Security researchers have discovered a flaw, wherein two techniques are used to remove the restrictions [...]