+44 (0)203 88 020 88

Menu

Search

Author name: Ian Reynolds

New Hard to Detect Linux Threat Discovered

A new Linux backdoor threat has been discovered, using malware known as ‘Symbiote’. This name has come from its ability to hide itself well, whilst stealing data and credentials from the ‘host’ victim. A threat report released last week by Intezer and The BlackBerry Threat Research & Intelligence Team details how this malware works, and why it’s […]

New Hard to Detect Linux Threat Discovered Read More »

Critical Atlassian Confluence Vulnerability Exploited

Atlassian are warning customers of a critical remote code execution vulnerability in their Confluence collaboration server which affects on-premises installations of Confluence Server and Data Center editions.   Tracked as CVE-2022-26134, the flaw was identified by Volexity at the start of this month and it impacts Confluence Server 7.18.0 and Confluence Server and Data Center 7.4.0.

Critical Atlassian Confluence Vulnerability Exploited Read More »

Microsoft Office Zero-Day attack identified

A new vulnerability has been discovered that can allow a malicious document to run arbitrary code on a Windows computer.  Although the obvious attack vector is MS Office documents, Microsoft is describing this as a Windows Operating System vulnerability according to CVE-2022-30190. A Word Document was found to be able to abuse the Microsoft Windows

Microsoft Office Zero-Day attack identified Read More »

Microsoft warns of Kerberos Relay attacks

Microsoft has issued several updates to help Systems Admins protect their networks against Kerberos Relay attacks.  Microsoft have said no security patch will be provided to mitigate this attack vector, so config changes must be made to default Windows Domain Controller on premise installations.  Microsoft explains the vulnerability in a recent blog post: Detecting and

Microsoft warns of Kerberos Relay attacks Read More »

10 Common Security Weaknesses and How To Defend Against Them

The mistakes we make and how to fix them – a new report co-authored by the NCSC reveals the 10 most common security weaknesses exploited by hackers. A joint security alert from the National Cyber Security Centre UK (NCSC-UK) was released earlier this month, co-authored by cybersecurity bodies from the USA, Canada, New Zealand, and

10 Common Security Weaknesses and How To Defend Against Them Read More »

0

No products in the basket.

No products in the basket.