BACKGROUND: Researchers at Forescout have today disclosed a new set of critical Nucleus Net vulnerabilities, dubbed NUCLEUS:13. The vulnerabilities, which may be…
Browsing: Malware and Vulnerabilities
Organisations have long acknowledged the importance of backing up data stored on their ‘endpoints’ – i.e., the remote computing devices…
In Q2 2021, malware activity began to rise while Nuspire saw a decrease in botnet and exploit activity compared to…
BACKGROUND: CISA has issued Binding Operational Directive (BOD) 22-01, Reducing the Significant Risk of Known Exploited Vulnerabilities. The directive contains…
BACKGROUND: In response to reports that the CISA has issued a new directive that forces federal civilian agencies to address at least…
The Underminer exploit kit has surfaced numerous times since 2019, but here it is back again delivering the Amadey malware, as the…
BACKGROUND: Researchers with the University of Cambridge discovered a bug that affects most computer code compilers and many software development…
The BBC report that a Squid Game crypto token collapses in apparent scam. A digital token inspired by the popular…
BACKGROUND: It has been reported that security researchers have gone public about a set of five vulnerabilities in telecoms stack software FreeSwitch.…
BACKGROUND: Researchers at the Lookout Threat Lab provide a highly detailed review of new rooting malware distributed in fully functioning…