vulnerability
ProxyShell vulnerabilities actively exploited to deliver web shells and ransomware
Three so-called “ProxyShell” vulnerabilities are being actively exploited by various attackers to compromise Microsoft Exchange servers around the world, the …
Things that are easy to miss in the race towards hybrid working and the cloud
The mega-trend towards hybrid working and cloud migration seems unstoppable. But customer service organizations could find their wheels come off if they fail to address a …
As hybrid working arrangements remain, employers must ensure their staff works safely
Working from home has significantly increased cybersecurity vulnerabilities over the past two years, according to the world’s leading enforcement agencies. Employers must …
Enterprises looking to cybersecurity providers to help protect IT systems
As enterprises in Germany digitize their operations and deal with the ongoing effects of the COVID-19 pandemic, they are looking to cybersecurity service providers to help …
Unpatched Fortinet FortiWeb vulnerability allows remote OS command injection
An unpatched vulnerability in the management interface for FortiWeb, Fortinet’s web application firewall, could allow a remote, authenticated attacker to execute …
Critical bug allows remote compromise, control of millions of IoT devices (CVE-2021-28372)
A vulnerability (CVE-2021-28372) in the SDK that allows IoT devices to use ThroughTek’s Kalay P2P cloud platform could be exploited to remotely compromise and control …
65 vendors affected by severe vulnerabilities in Realtek chips
A vulnerability within the Realtek RTL819xD module allows attackers to gain complete access to the device, installed operating systems and other network devices. The chips …
How to foster collaboration with the IT team for a successful zero trust implementation
The conversation surrounding deploying a zero trust strategy continues to gain importance following the announcement of President Biden’s recent Executive Order, which …
Reliance on third party workers making companies more vulnerable to cyberattacks
A survey from SecZetta revealed 83% of respondents agree that because organizations increasingly rely on contractors, freelancers, and other third party workers, their data …
Microsoft confirms another Windows Print Spooler bug, offers workaround (CVE-2021-36958)
A day after the August 2021 Patch Tuesday, Microsoft has released an out-of-band security advisory acknowledging the existence of yet another Print Spooler vulnerability …
Hospitals still not protected from dangerous vulnerabilities
Ipsos conducted a research which examines attitudes, concerns, and impacts on medical device security as well as cybersecurity across large and midsize healthcare delivery …
Microsoft patches actively exploited zero-day (CVE-2021-36948), more Print Spooler flaws
Microsoft’s August 2021 Patch Tuesday is pretty lightweight, through it covers a wide variety of Microsoft solutions. 44 CVE-numbered security holes have been plugged, …
Featured news
Resources
Don't miss
- Law enforcement tracks ransomware group blamed for massive financial losses
- Global tensions are pushing cyber activity toward dangerous territory
- Review: AI Strategy and Security
- Bytebase: Open-source database DevOps tool
- Cisco fixes AsyncOS vulnerability exploited in zero-day attacks (CVE-2025-20393)