+44 (0)203 88 020 88

Menu

Search

2020

How Return-Oriented Programming exploits work

Return-Oriented Programming is a security exploit technique used by attackers to execute code on their target system.  By obtaining control of the call stack, the attacker can control the flow of existing trusted software running on the computer and manipulate it to their own ends.  New research published this month has demonstrated how SPECTRE style vulnerabilities […]

How Return-Oriented Programming exploits work Read More »

NCSC Publishes Vulnerability Disclosure Toolkit

The UK National Cyber-Security Centre has published a toolkit to help organisations setup a vulnerability disclosure programme. A vulnerability disclosure programme makes it easy for someone to provide your organisation with information if they notice a vulnerability that could impact your security.  Without such a programme in place, concerned clients or researchers have to resort

NCSC Publishes Vulnerability Disclosure Toolkit Read More »

September patch Tuesday fixes 23 Critical Microsoft Vulnerabilities

The September 2020 patch Tuesday contain fixes for 23 Critical vulnerabilities in Microsoft products and 129 fixes in total – including a Microsoft Exchange vulnerability that can allow remote code execution simply by sending a specially crafted email to the server. A large patch bundle is a double edged sword – it’s reassuring that the

September patch Tuesday fixes 23 Critical Microsoft Vulnerabilities Read More »

Pass-the-hash attack discovered in Windows Themes

A new vector for pass-the-hash attacks has been discovered targeting Windows 10 personalisation themes. A security researcher has published details of a potential issue with the design of Windows 10 themes that can be exploited to harvest Windows and Microsoft Account login credentials. A Windows 10 theme is a collection of customisation settings for Windows

Pass-the-hash attack discovered in Windows Themes Read More »

Microsoft Launches Application Guard preview

Microsoft Application Guard helps protect against malware in Office documents by opening each document in its own segregated virtual machine. Microsoft says in the release notes: Application Guard is a virtualization-based sandbox that’s used to isolate untrusted documents you may encounter. It brings the same technology that powers Azure to your desktop. Untrusted documents are

Microsoft Launches Application Guard preview Read More »

RDP Based Attacks Increase During Lockdown

The number of ransomware attacks using RDP as the attack vector has increased sharply during the COVID lockdown. As the number of staff working remotely exploded during the COVID lockdown, criminals were quick to respond by targeting Remote Desktop Protocol services with ransomware.  For example, Group-IB recently reported that the Dharma ransomware-as-a-service was being used

RDP Based Attacks Increase During Lockdown Read More »

0

No products in the basket.

No products in the basket.