A Critical Flaw Is Affecting Thousands of WordPress Sites

A Critical Flaw Is Affecting Thousands of WordPress Sites

Hackers are actively exploiting a vulnerability that allows them to execute commands and malicious scripts on websites running File Manager, a WordPress plugin with more than…

View More A Critical Flaw Is Affecting Thousands of WordPress Sites
Cyber Kill Chain - Lockheed Martin

Cyber Kill Chain – Lockheed Martin

Security incidents are events that may indicate that an organization’s systems or data have been compromised or that measures put in place to protect them…

View More Cyber Kill Chain – Lockheed Martin
Critical RCE Bug in Cisco WebEx Browser Extensions Faces ‘Ongoing Exploitation’

Critical RCE Bug in Cisco WebEx Browser Extensions Faces ‘Ongoing Exploitation’

A critical vulnerability in Cisco WebEx browser extensions that could allow unauthenticated remote code-execution (RCE) on targeted machines is being actively exploited in the wild.…

View More Critical RCE Bug in Cisco WebEx Browser Extensions Faces ‘Ongoing Exploitation’
Exploit Fully Breaks SHA-1, Lowers the Attack Bar

Exploit Fully Breaks SHA-1, Lowers the Attack Bar

A proof-of-concept attack has been pioneered that “fully and practically” breaks the Secure Hash Algorithm 1 (SHA-1) code-signing encryption, used by legacy computers to sign…

View More Exploit Fully Breaks SHA-1, Lowers the Attack Bar
Microsoft Warns Of Hacking Group Targeting Vulnerable Web Servers

Microsoft Warns Of Hacking Group Targeting Vulnerable Web Servers

Microsoft has revealed details of a hacking group it calls Gallium that has malware infrastructure in China and Hong Kong and has been targeting telecommunications…

View More Microsoft Warns Of Hacking Group Targeting Vulnerable Web Servers
BlueKeep attacks are happening, but it's not a worm

BlueKeep attacks are happening, but it’s not a worm

Security researchers have spotted the first mass-hacking campaign using the BlueKeep exploit; however, the exploit is not being used as a self-spreading worm, as Microsoft…

View More BlueKeep attacks are happening, but it’s not a worm
What is a zero-day vulnerability

What is a zero-day vulnerability?

Chances are pretty good you’ve heard the term zero-day vulnerability. The term conjures up images of post-apocalyptic landscapes, where technology has either hit a singularity-level…

View More What is a zero-day vulnerability?
What can you do about the 'unfixable' exploit affecting almost every iPhone and iPad?

What can you do about the ‘unfixable’ exploit affecting almost every iPhone and iPad?

The Checkm8 exploit, described by the security researcher who published it as “a permanent unpatchable bootrom exploit” might be good news for the jailbreaking community…

View More What can you do about the ‘unfixable’ exploit affecting almost every iPhone and iPad?