+44 (0)203 88 020 88

Menu

Search

2021

PrintNightmare vulnerabilities exploited in the wild

Cyber-criminals have been exploiting the Windows PrintNightmare vulnerability to attack networks around the world.  PrintNightmare is the name given to a collection of vulnerabilities in the Windows Print Spooler. According to reports from Talos and CrowdStrike, several threat actors have now incorporated the PrintNightmare vulnerabilities into attacks on their victims networks. The PrintNightmare vulnerabilities were […]

PrintNightmare vulnerabilities exploited in the wild Read More »

What is the Cybersecurity Maturity Model?

The Cybersecurity Maturity Model provides a way for organisations to assess their cyber security processes and capabilities with a focus on defending against Advanced Persistent Threat actors. The Cybersecurity Maturity Model Certification (CMMC) was developed by Carnegie Mellon and Johns Hopkins at the request of the US Department of Defence and was launched in March

What is the Cybersecurity Maturity Model? Read More »

VPN insecurity woes continue for Pulse Secure and Cisco

Cisco and Pulse Secure have both issued security advisories warning of critical Remote Code Execution vulnerabilities that affect some of their VPN servers. Pulse Secure Pulse Secure has shipped a patch to resolve several Remote Code Execution vulnerabilities in its Connect Secure VPN appliances.  The August release addresses these issues and the vendor ‘strongly advises’

VPN insecurity woes continue for Pulse Secure and Cisco Read More »

How the No More Ransom project helps victims of ransomware

In 2016, Europol, the Netherlands Police and leading anti-virus companies joined forces to create the No More Ransom project, which to date has helped over 6 million ransomware victims recover their files and avoid paying €1billion in ransom. The nomoreransom.org website provides advice for individuals and businesses on how to protect themselves against ransomware and

How the No More Ransom project helps victims of ransomware Read More »

PetitPotam attack leaves Windows Domain Controllers Vulnerable

Microsoft has moved swiftly to publish mitigation advice for a new NTLM relay attack against Windows Domain controllers, dubbed PetitPotam. An NTLM relay attack can occur when an attacker inserts themselves between a valid client-server authentication request in a Windows Domain or tricks one system into trying to authenticate itself and so providing a copy

PetitPotam attack leaves Windows Domain Controllers Vulnerable Read More »

0

No products in the basket.

No products in the basket.