+44 (0)203 88 020 88

Menu

Search

Author name: Ian Reynolds

Strela Stealer Malware – From Invoice Phishing to Thread Hijacking

In recent months, a notable wave of cyber-attacks has swept across Europe, orchestrated by the cybercriminal group known as Hive0145. This group, also referred to by various threat intelligence entities as a highly organised Advanced Persistent Threat (APT), has been delivering a specific strain of malware—Strela Stealer—to infiltrate and compromise systems. Targeting countries primarily including […]

Strela Stealer Malware – From Invoice Phishing to Thread Hijacking Read More »

Palo Alto Networks PAN-OS RCE Vulnerability (CVE-2024-5910)

Palo Alto Networks has issued an urgent advisory to its customers, highlighting a potential remote code execution (RCE) vulnerability within the PAN-OS management interface. The cybersecurity firm advises organisations to secure access to this interface to mitigate potential risks. The advisory follows claims of a new RCE vulnerability targeting the PAN-OS management interface. While the

Palo Alto Networks PAN-OS RCE Vulnerability (CVE-2024-5910) Read More »

Critical VMware vCenter Server Vulnerability (CVE-2024-38812) Poses Serious Risk

The CVE-2024-38812 vulnerability is a critical flaw that exposes VMware vCenter Servers to serious security risks, including remote code execution and full system compromise. Organisations using VMware’s virtualisation tools must prioritise the patching of this vulnerability and implement strict security measures to prevent exploitation. Swift action is required to protect virtual infrastructure and mitigate the

Critical VMware vCenter Server Vulnerability (CVE-2024-38812) Poses Serious Risk Read More »

Critical Microsoft SharePoint Vulnerability (CVE-2024-38094) Creates Remote Code Execution Threat

The recently disclosed vulnerability, CVE-2024-38094, in Microsoft SharePoint presents a significant threat to organisations by allowing attackers to execute remote code on compromised servers. This flaw stems from improper input validation when processing ASPX files in SharePoint, and it requires minimal user interaction to exploit. Once exploited, the consequences can be severe, particularly for organisations

Critical Microsoft SharePoint Vulnerability (CVE-2024-38094) Creates Remote Code Execution Threat Read More »

Nation-State Attackers Exploiting Critical Infrastructure: A Growing Threat

Nation-state cyberattacks on critical infrastructure are becoming increasingly sophisticated and destructive, as highlighted by recent reports. In October 2024, attackers began exploiting vulnerabilities in Ivanti software used by critical sectors, including energy and transportation. These vulnerabilities allowed cyber actors to gain unauthorised access, move laterally within networks, and execute persistent attacks, sometimes even “patching” exploited

Nation-State Attackers Exploiting Critical Infrastructure: A Growing Threat Read More »

Apple Patches VoiceOver Bug That Could Read Passwords Aloud

Apple has recently addressed a significant vulnerability in its VoiceOver feature that raised privacy concerns for iPhone and iPad users. The flaw, identified as CVE-2024-44204, allowed the VoiceOver accessibility tool to read saved passwords out loud, a critical issue for users relying on this feature to navigate their devices without visual input. The bug was

Apple Patches VoiceOver Bug That Could Read Passwords Aloud Read More »

Latest Snapekit Rootkit Poses Threat to Arch Linux Users

A newly discovered rootkit known as “Snapekit” has emerged, posing a significant risk to users of Arch Linux systems, particularly those running the 6.10.2-arch1-1 kernel. According to reports from multiple cybersecurity researchers, Snapekit is a highly sophisticated rootkit that exploits 21 system calls, enabling it to operate stealthily while avoiding detection. Its ability to remain

Latest Snapekit Rootkit Poses Threat to Arch Linux Users Read More »

cyber essentials, cyber essentials, iasme, willow

Cyber Essentials – What’s Changed in the Latest Willow Question Set?

Recently, IASME has introduced their latest Willow question set for the NCSC Cyber Essentials Self-Assessment Certification, which will replace the current (Montpelier) questions on the 28th April, 2025. The updates in Willow reflect evolving cybersecurity needs, incorporating more detailed and specific questions to help organisations better protect themselves from cyber threats. Here are some key

Cyber Essentials – What’s Changed in the Latest Willow Question Set? Read More »

NVIDIA Vulnerability CVE-2024-0132: A Deep Dive into the Threat and Mitigation

In September 2024, NVIDIA disclosed a critical security flaw, CVE-2024-0132, affecting its NVIDIA Container Toolkit. This vulnerability has sent shockwaves through the IT and cybersecurity communities due to its severity and potential to compromise container environments. The flaw, which has been assigned a CVSS score of 9.0 out of 10, underscores the ever-present risks of

NVIDIA Vulnerability CVE-2024-0132: A Deep Dive into the Threat and Mitigation Read More »

Meta Fined €91 Million for Failing to Properly Protect User Passwords

Meta, the parent company of Facebook and Instagram, has been hit with a significant €91 million (£79 million) fine by Ireland’s Data Protection Commission (DPC) after an investigation revealed serious lapses in the company’s handling of user data. The fine stems from Meta’s failure to properly encrypt millions of user passwords, which were stored in

Meta Fined €91 Million for Failing to Properly Protect User Passwords Read More »

0

No products in the basket.

No products in the basket.