Join Us At The Big CISO 360 Event

CISO

Don’t leave without reading about this invigorating event hosted by Pulse Conferences celebrating the 5th anniversary of the CISO 360 Congress. And guess what, it’s NOT VIRTUAL but Hybrid.💃 We, Risk Crew will be sponsoring this event and we are looking forward to meeting you in person at Victorian Gothic Mansion House Oakley Court, Windsor, […]

Millions of Connected Cameras Open to Eavesdropping on IoT Camera Feeds

IoT Camera

A supply-chain component contains a critical impact vulnerability that allows a remote attacker to eavesdrop on IoT camera feeds. CVE-2021-32934 has a CVSS score of 9.1, it was introduced through ThroughTek, a component that is commonplace in CCTV systems along with other connected camera devices such as baby monitors. ThroughTek’s point-to-point (P2P) software development kit […]

New Kubernetes Malware Backdoors Clusters via Windows Containers

windows containers

A malware strain has been at large for over a year, which was observed to compromise Kubernetes Clusters clearing the way for a backdoor, giving the attacker persistent access. Kubernetes was originally developed by Google and is currently maintained by the Cloud Native Computing Foundation. It is an open-source system that helps automate the deployment, […]

SOC 2 Type 2: How to Prepare for the Audit Webinar

soc 2 type 2

Risk Crew announces part 2 of the SOC-IT-2-ME series, SOC 2 Type 2: How to Prepare for the Audit Webinar. Let us give you an insight into our upcoming webinar. Established by the American Institute of Certified Public Accountants, SOC 2 defines a governance framework for managing sensitive customer information based on 5 Trust Service […]

NoSQL Injection Attacks Expose Rocket Chat Servers to Remote Code Execution

Rocket chat servers

Two vulnerabilities in the Rocket Chat (RC) application make it possible for attackers to achieve remote code execution on the server hosting them. RC is a popular open-source messaging platform for enterprise customers. Customers include Lloyd’s, Lockheed Martin and the University of California. RC utilises the MongoDB database, which uses NoSQL to store its data. […]

“Wormhole” Proof of Concept Released for Wormable Windows HTTP Vulnerability

Windows HTTP Vulnerability

A proof of concept (PoC) script was released exploiting a critical vulnerability in the latest version of Windows 10 and Windows Server additions. The vulnerability, tracked as CVE-2021-31166 was found in the HTTP Protocol Stack (HTTP.sys), used by the Windows Information (IIS) webserver. The Windows HTTP vulnerability has wormable properties, meaning it is self-propagating, unlike […]

4 Business Questions About IoT Devices

IoT Devices

Are your IoT devices secure? Internet of things (IoT) devices have seen year on year increases in business and personal use because they are usually beneficial in being convenient and easy to use. IoT devices are used for various purposes, from making smart homes to implementing a business’s security system. As with all internet connected […]

“Sapped” Critical Vulnerabilities are Exploited in SAP Applications

Cyber security firm, Onapsis, has warned of 6 critical vulnerabilities being actively exploited in the wild. The researchers recorded more than 300 successful attacks between mid-2020 and April 2021. SAP systems are used by many organisations for managing critical business processes, including product life-cycle management, customer relationship management, enterprise resource planning and supply chain management. […]

“Offroad” Vulnerable Dell Drivers Endangers Millions of Systems

dell drivers

Older Dell users should be aware of a vulnerable driver that has been pushed out to consumer and enterprise computers for the last 12 years. The multiple vulnerabilities could lead to privilege escalation. Millions of Dell desktops, laptops and tablets received the vulnerable driver through BIOS updates. The 5 vulnerabilities tracked as CVE-2021-21551 discovered in […]

Risk Crew