+44 (0)203 88 020 88

Menu

Search

2020

When Good Employees Go Bad

A recent court case underlines the importance of good operational security procedures to manage employee and contractor exits to ensure all their access is revoked. A man has been sentenced to two years after deleting 456 virtual machines from Cisco’s infrastructure – 4 months after resigning from the firm. As a result of the malicious […]

When Good Employees Go Bad Read More »

SolarWinds hack sends chills through security industry

SolarWinds provides tools used by security and network managers in many of the largest businesses and governments in the world.  Since March 2020 hackers inserted their own code into SolarWinds Orion software which was downloaded by some 18,000 customers – providing a backdoor into those customers’ networks. SolarWinds Orion is a network health and performance

SolarWinds hack sends chills through security industry Read More »

What is file integrity monitoring?

File Integrity Monitoring systems generate alerts when intruders make unexpected changes to the files on your servers – either by changing existing files or creating new ones. Robust cybersecurity can be most effectively achieved by adopting a ‘defence in depth’ approach.  This means deploying several layers of protection, using different technologies so that the overlapping

What is file integrity monitoring? Read More »

Drupal vulnerability affects a million sites

A vulnerability in the Drupal web content management system can be exploited to allow arbitrary code execution, affecting almost a million websites. A security advisory from Drupal describes how this critical vulnerability can be exploited to perform arbitrary execution of PHP code.  Security patches are available for Drupal versions 7, 8 and 9. The problem

Drupal vulnerability affects a million sites Read More »

Hackers target Oracle WebLogic vulnerability

Oracle patched a vulnerability in their WebLogic server in October 2020 – eight days later working exploit code was published online and now it is being used by criminals. CVE-2020-14882 allows an attacker to perform a Remote Code Execution attack with minimal effort or skill required.  Juniper Networks security researchers reports at least five different

Hackers target Oracle WebLogic vulnerability Read More »

VMWare warns of critical zero-day vulnerability

VMWare has issued a security advisory warning of a command injection vulnerability that could allow someone with access to the VMWare Configurator admin account to issue command with unrestricted privileges on the underlying operating system. The vulnerability (CVE-2020-4006) affects VMWare Workspace One Access, Access Connector, Identity Manage and Identify Manager Connector administrative configurator.  A malicious

VMWare warns of critical zero-day vulnerability Read More »

NCSC alerts over MobileIron vulnerability

The UK National Cyber Security Centre has issued an alert warning that multiple actors are attempting to exploit a MobileIron vulnerability to compromise the networks of UK organisations. MobileIron issued a security patch in June 2020 for their Mobile Device Management system to resolve several vulnerabilities in their software.  Included was a critical remote code

NCSC alerts over MobileIron vulnerability Read More »

0

No products in the basket.

No products in the basket.