5 Tips to Stay Secure When Shopping Online5 Tips to Stay Secure When Shopping Online

5 Tips to Stay Secure When Shopping Online

5 years ago

With the holiday season quickly approaching and the Pandemic tier level restrictions being unclear, many of us are turning to…

“Dark tidings” Recent Oracle WebLogic vulnerability exploited by DarkIRC Malware“Dark tidings” Recent Oracle WebLogic vulnerability exploited by DarkIRC Malware

“Dark tidings” Recent Oracle WebLogic vulnerability exploited by DarkIRC Malware

5 years ago

A Remote Code Execution vulnerability, in the Oracle WebLogic Server, was recently discovered. The Oracle WebLogic vulnerability was due to…

How Much Does an ISO 27001 Certification Cost?How Much Does an ISO 27001 Certification Cost?

How Much Does an ISO 27001 Certification Cost?

5 years ago

ISO 27001 is an internationally recognised standard for information security management systems (ISMS). It provides a framework for organisations to…

Google Services Weaponized to Bypass Security in PhishingGoogle Services Weaponized to Bypass Security in Phishing

Google Services Weaponized to Bypass Security in Phishing

5 years ago

There was a spike in Phishing and business email compromises due to threat actors exploiting Google services. The attacks weaponize services…

Top 5 Signs of Social Engineering AttacksTop 5 Signs of Social Engineering Attacks

Top 5 Signs of Social Engineering Attacks

5 years ago

What are the Signs of a Social Engineering Attack and How Can You Prevent Them? Social engineering is the most…

Remote Code Execution Discovered in Cisco Security ManagerRemote Code Execution Discovered in Cisco Security Manager

Remote Code Execution Discovered in Cisco Security Manager

5 years ago

Multiple security advisories related to critical flaws in the Cisco Security Manager product have been released. These revelations come a…

Mismanagement: Flaws in Privileged Management Apps Expose Machines to AttackMismanagement: Flaws in Privileged Management Apps Expose Machines to Attack

Mismanagement: Flaws in Privileged Management Apps Expose Machines to Attack

5 years ago

The Intel Support Assistant utility was found to be vulnerable to privilege escalation through file manipulation and symbolic links, putting…

Protect Your SME from Hacker AttacksProtect Your SME from Hacker Attacks

Protect Your SME from Hacker Attacks

5 years ago

It is estimated that six in ten SMEs that suffer a breach are likely to go out of business within…

“Through The Cracks” NAT/Firewall Bypass Lets Hackers Access Any TCP/UDP Service“Through The Cracks” NAT/Firewall Bypass Lets Hackers Access Any TCP/UDP Service

“Through The Cracks” NAT/Firewall Bypass Lets Hackers Access Any TCP/UDP Service

5 years ago

Security researcher, Samy Kamkar, has discovered a technique that allows an attacker to bypass NAT/Firewall protections, leading to remote access…

Hot seat – Hotspot Shield VPN New Privilege Escalation VulnerabilityHot seat – Hotspot Shield VPN New Privilege Escalation Vulnerability

Hot seat – Hotspot Shield VPN New Privilege Escalation Vulnerability

5 years ago

A high-risk vulnerability, rated as 7.8 in CVSS v3.1, affecting Windows 10.3.0 and earlier exists in the Hotspot Shield VPN…