With the holiday season quickly approaching and the Pandemic tier level restrictions being unclear, many of us are turning to…
A Remote Code Execution vulnerability, in the Oracle WebLogic Server, was recently discovered. The Oracle WebLogic vulnerability was due to…
ISO 27001 is an internationally recognised standard for information security management systems (ISMS). It provides a framework for organisations to…
There was a spike in Phishing and business email compromises due to threat actors exploiting Google services. The attacks weaponize services…
What are the Signs of a Social Engineering Attack and How Can You Prevent Them? Social engineering is the most…
Multiple security advisories related to critical flaws in the Cisco Security Manager product have been released. These revelations come a…
The Intel Support Assistant utility was found to be vulnerable to privilege escalation through file manipulation and symbolic links, putting…
It is estimated that six in ten SMEs that suffer a breach are likely to go out of business within…
Security researcher, Samy Kamkar, has discovered a technique that allows an attacker to bypass NAT/Firewall protections, leading to remote access…
A high-risk vulnerability, rated as 7.8 in CVSS v3.1, affecting Windows 10.3.0 and earlier exists in the Hotspot Shield VPN…