
Microsoft WPBT Vulnerability Allow Hackers to Install Rootkits on Windows Devices
Security researchers from the Eclypsium research team have discovered a vulnerability in the Windows Platform [...]
Unlocking the Potential: Exploring the Benefits of a vCISO
There is no doubt that the number of qualified and available cyber security experts is [...]
“Continuity Issues” Private Repository Contents Leak by Travis Cl
The maintainers of Travis CI, a continuous integration provider located in Berlin, have patched a [...]
“Double-barrelled” Zloader Attacks Disable Windows Defender to Evade Detection
An ongoing Zloader campaign utilises a new methodology to disable Microsoft Defender Antivirus. Formerly known [...]
SaaS Security 101: Essential Strategies for Businesses
Software companies have naturally embraced the cloud. It provides countless benefits for their clients, ranging [...]
Netgear’s Smart Switches Affected by Multiple Vulnerabilities
Netgear has released patches for the firmware version of more than a dozen smart switches [...]
Critical Bug Hacking into IoT Devices
Security experts are sending out a high alert on a critical vulnerability that heavily affected [...]
Death by Trust – The Dangers of Whitelisting
Introduction Whitelisting is a cyber security strategy where a user granted administrative rights could take [...]
“Fly Trap” Cyber Attackers Target Home Routers
Three days after the revelation, cyber attackers are commandeering home routers from 20 vendors along [...]
“Hate Mail” How a Single Email Can Compromise Zimbra Webmail Servers
The Zimbra webmail solution is affected by two serious vulnerabilities that could allow an attacker [...]