If you have never experienced a vishing scam, then this is the alert for you. You may want your friends and co-workers to listen too and see if they can spot why it is a scam. Be warned that this can happen with people using any accent from anywhere in the world if they have […]
There is another Android trojan roaming on mobile smartphones known as BlackRock, which can steal card data from more than 337 apps. What makes this trojan unique to other trojan apps, is the number of applications it can steal data from. It can steal usernames and passwords where available as well as prompt users to […]
Users of twitter have been scammed by attackers who took control of well-known people such as Jeff Bezos and Elon Musk. Within 30 minutes, the attackers were supposedly able to gain over £80,000. This was shut down quickly, but a lot of damage had been done. There are 2 issues raised here: Security of twitter […]
Over 40,000 SAP customers need to update to the latest version to mitigate risk from remote unauthenticated attackers obtaining complete access to their SAP database. Although there is no evidence it has been exploited yet, it is only a matter of time before malicious attackers take advantage of this. Don’t let them exploit you! The […]
This vulnerability gives the CVSS score of 10/10, meaning it could result in unpatched users to be completely compromised. The issue is in the TMUI configuration utility and can be exploited by unauthenticated remote attackers via sending a malicious HTTP request to the vulnerable server. In June, there were over 8000 vulnerable devices that were […]
Two CVE’s (2020-9497 and 2020-9498) have been announced in the Apache Guacamole service. Successful exploitation of these vulnerabilities would allow an attacker to hijack a session on the host device or steal credentials. These vulnerabilities have been highlighted in version 1.1.0 of Guacamole. This version of the software should be updated to the latest version […]