In response to reports that a new Emotet malware targets victims using spam emails that contain malicious attachments under the guise of coronavirus reports,…
Browsing: Malware and Vulnerabilities
Two vulnerabilities found in Microsoft Azure services could have allowed cybercriminals to take over cloud services according to a new report from Checkpoint.
In response to reports from Microsoft detailing that a new TA505 phishing campaign is using attachments featuring HTML redirectors for delivering malicious Excel…
A high severity cross-site request forgery (CSRF) bug allows attackers to take over WordPress sites running an unpatched version of…
An internal confidential document from the UN was leaked, saying that 42 servers were “compromised” and another 25 were deemed…
A vulnerability in LabCorp’s website that hosts the company’s internal customer relationship management system, exposed thousands (at least 10,000) of…
Any organisation can face significant downtime, data loss and employee displacement if unprepared when a disaster strikes. All of these…
Connectivity as a concept has become an essential part of life, as opposed to just a luxury. The Internet of…
According to BBC News, the UK government is developing laws that would require manufacturers to ensure their smart gadgets cannot be…
It has been reported that the US Cybersecurity and Infrastructure Agency (CISA) today issued an advisory for six high-severity security vulnerabilities in patient…