Hackers are actively exploiting a vulnerability that allows them to execute commands and malicious scripts on websites running File Manager, a WordPress plugin with more than…View More A Critical Flaw Is Affecting Thousands of WordPress Sites
Security incidents are events that may indicate that an organization’s systems or data have been compromised or that measures put in place to protect them…View More Cyber Kill Chain – Lockheed Martin
A critical vulnerability in Cisco WebEx browser extensions that could allow unauthenticated remote code-execution (RCE) on targeted machines is being actively exploited in the wild.…View More Critical RCE Bug in Cisco WebEx Browser Extensions Faces ‘Ongoing Exploitation’
A proof-of-concept attack has been pioneered that “fully and practically” breaks the Secure Hash Algorithm 1 (SHA-1) code-signing encryption, used by legacy computers to sign…View More Exploit Fully Breaks SHA-1, Lowers the Attack Bar
Microsoft has revealed details of a hacking group it calls Gallium that has malware infrastructure in China and Hong Kong and has been targeting telecommunications…View More Microsoft Warns Of Hacking Group Targeting Vulnerable Web Servers
Security researchers have spotted the first mass-hacking campaign using the BlueKeep exploit; however, the exploit is not being used as a self-spreading worm, as Microsoft…View More BlueKeep attacks are happening, but it’s not a worm
Chances are pretty good you’ve heard the term zero-day vulnerability. The term conjures up images of post-apocalyptic landscapes, where technology has either hit a singularity-level…View More What is a zero-day vulnerability?
The Checkm8 exploit, described by the security researcher who published it as “a permanent unpatchable bootrom exploit” might be good news for the jailbreaking community…View More What can you do about the ‘unfixable’ exploit affecting almost every iPhone and iPad?