vulnerability

Visit/security/vulnerability/354965/microsoft-accidentally-leaks-details-on-a-wormable-smb-flaw
vulnerability

Microsoft accidentally leaks details on a wormable SMB flaw

No patch is currently available for the vulnerability, which has now been publicly acknowledged
11 Mar 2020
Visit/security/vulnerability/354867/billion-plus-wi-fi-devices-hit-by-kr00k-vulnerability
vulnerability

Billion-plus Wi-Fi devices hit by serious Kr00k vulnerability

The flaw chiefly affects Broadcom and Cypress Wi-Fi chips and is related to the infamous KRACK attacks
27 Feb 2020
Visit/security/exploits/354731/microsoft-products-targeted-by-most-widely-used-exploits-in-2019
exploits

Microsoft products targeted by most widely-used exploits in 2019

Eight of the top ten exploitable flaws targeted Microsoft software, in addition to two Adobe Flash Player vulnerabilities
7 Feb 2020
Visit/security/vulnerability/354728/bluetooth-hijack-bug-among-25-android-flaws-patched-in-february
vulnerability

Bluetooth hijack bug among 25 Android flaws patched in February

Attackers could have exploited the flaw on older systems to execute arbitrary code on target devices
7 Feb 2020
Advertisement
Visit/security/network-security/354623/cisco-fixes-critical-flaw-in-network-management-platform
network security

Cisco fixes critical flaw in network management platform

The latest security hole is patched just days before the firm’s flagship Cisco Live 2020 conference
24 Jan 2020
Visit/security/vulnerability/354562/oracle-scolds-customers-for-ignoring-critical-patches
vulnerability

Oracle scolds customers for ignoring critical patches

Company claims many actively exploited vulnerabilities should have already been fixed
17 Jan 2020
Visit/security/vulnerability/354524/microsoft-to-patch-extraordinarily-serious-cryptographic-flaw
vulnerability

Microsoft to patch ‘extraordinarily serious’ cryptographic flaw

The fix has already been shipped to high-value organisations like the US military, according to reports
14 Jan 2020
Visit/security/vulnerability/354481/googles-project-zero-rolls-out-automatic-90-day-disclosures
vulnerability

Google’s Project Zero rolls out automatic 90-day disclosures

A raft of policy tweaks are aimed at instigating more thorough patch development and better patch adoption
8 Jan 2020
Visit/security/vulnerability/354309/patch-issued-for-critical-windows-bug
vulnerability

Patch issued for critical Windows bug

The two-part Chrome exploit is also associated with Operation WizardOpium
11 Dec 2019
Advertisement
Visit/vulnerability/34849/thousands-of-businesses-vulnerable-to-severe-oracle-ebs-flaws
vulnerability

Thousands of businesses vulnerable to 'severe' Oracle EBS flaws

The suite of enterprise products can be exploited for financial fraud and theft
20 Nov 2019
Visit/internet-of-things-iot/34786/ring-doorbells-leak-users-wi-fi-passwords-in-clear-text
Ring doorbell
Internet of Things (IoT)

Ring doorbells leak users' Wi-Fi passwords in clear text

News comes amid mounting criticism of the Amazon-owned surveillance company
8 Nov 2019
Advertisement
Visit/security/34773/tenable-declares-there-are-far-worse-security-threats-to-fear-than-zero-day-exploits
Zero-day exploit
Security

Tenable: There are far more dangerous threats than zero-days

‘If you’re scared of zero-days, you don’t know what you’re talking about’ claims Tenable
7 Nov 2019
Visit/security/34711/could-virgin-galactic-s-ipo-indicate-an-interstellar-step-change-for-cyber-security
Virgin Galactic
Security

Is cyber security about to go interstellar?

When we think about the cyber attacks of the future, we may have to think bigger
30 Oct 2019
Visit/security/34708/never-give-humans-the-keys-to-your-kingdom-say-goldman-sachs-security-chiefs
Security

Humans 'unfit' to handle access managment, say Goldman Sachs

Privileged access management is rarely done well and humans are usually the issue
29 Oct 2019
Visit/security/34594/apt-groups-exploiting-vpns-to-carry-out-cyber-attacks
Security

APT groups exploiting VPNs to carry out cyber attacks

NCSC and NSA warn that services from Palo Alto, Fortinet and Pulse Secure are vulnerable
9 Oct 2019
Advertisement
Visit/wannacry/34352/what-is-wannacry
WannaCry

What is WannaCry?

The full story behind one of the worst ransomware outbreaks in history
9 Sep 2019
Visit/security/34349/android-flaws-decline-in-2019-as-ios-malware-rises
Mobile phone security image
Security

Android flaws decline in 2019 as iOS malware rises

Flaws in the most popular operating systems, however, are just as dangerous as third-party bugs
6 Sep 2019
Visit/vulnerability/34184/what-s-the-difference-between-a-security-vulnerability-and-a-security-threat
Spyware Skull
vulnerability

Security vulnerabilities vs security threats

How you can protect your business against these dual concerns
17 Aug 2019
Visit/security/34226/knob-attack-lets-hackers-insert-themselves-into-your-bluetooth-calls
Security

KNOB attack lets hackers listen in on your Bluetooth calls

Vulnerability allows attackers to ‘completely break’ Bluetooth encryption
16 Aug 2019
Visit/cyber-security/34205/microsoft-patches-abundance-of-critical-and-wormable-windows-vulnerabilities
Microsoft's flagship OS Windows 10 on a purple graphic
cyber security

Microsoft patches abundance of Windows vulnerabilities

BlueKeep-like RCE flaws featured among the 93 bugs patched by Microsoft
14 Aug 2019
Visit/ransomware/34191/researchers-show-how-easy-it-is-to-inject-a-dslr-camera-with-ransomware
Hacked camera
ransomware

Researchers show how to inject a DSLR with ransomware

Hackers can encrypt a camera using just a Wi-Fi connection, demo shows
12 Aug 2019
Advertisement
Visit/security/vulnerability/354391/getting-started-with-vulnerability-mitigation
vulnerabilitywhitepaper

Getting started with vulnerability mitigation

Manage threats in plain sight
9 Aug 2019
Visit/security/vulnerability/354401/how-to-combat-shadow-it-challenges
vulnerabilitywhitepaper

How to combat shadow IT challenges

Strategies for shining a light on cloud services in your organisation
9 Aug 2019