+44 (0)203 88 020 88

Author name: secureteampstg

Wi-Fi FragAttacks expose flaws in WPA2, WPA3

Design and Implementation flaws in Wi-Fi standards have been disclosed that could leave home and enterprise Wi-Fi networks vulnerable.  The flaws are thought to affect all Wi-Fi systems from WEP through to the latest WPA3 security standard. The vulnerabilities have been named FragAttacks as they are mainly related to flaws in the way Wi-Fi fragments […]

Wi-Fi FragAttacks expose flaws in WPA2, WPA3 Read More »

Microsoft and Adobe release patches for zero day vulnerabilities

May Patch Tuesday sees four critical vulnerabilities patched by Microsoft and Adobe ships a fix for an Acrobat Reader zero-day that is under attack in the wild. Microsoft Patch Tuesday May 2021 55 vulnerabilities, 4 critical, are resolved in the May security patch bundle from Microsoft.  Of particular note are: CVE-2021-31166 which is a Windows

Microsoft and Adobe release patches for zero day vulnerabilities Read More »

Exim Mail Server 21Nails critical vulnerabilities

21 critical vulnerabilities have been discovered in the Exim Email server, some of which can be exploited to perform full remote unauthenticated code execution and gain root privilege on the server. Called 21Nails, this set of vulnerabilities is, to the Unix world, as serious as the ProxyLogon vulnerabilities recently discovered in Microsoft Exchange Server. The

Exim Mail Server 21Nails critical vulnerabilities Read More »

What is Cyber Supply Chain Risk Management?

Recent high-profile security incidents, such as the compromises at SolarWinds and CodeCov and the vulnerabilities in Microsoft Exchange Server, have drawn attention to the risks posed by the software we invite into the heart of our networks and often trust implicitly. The processes and procedures for identifying and mitigating the risks posed by these third-party

What is Cyber Supply Chain Risk Management? Read More »

Microsoft and Intel enhance Cryptojacking protection

Microsoft Defender for Endpoint now works with Intel’s low level CPU hardware based Threat Detection Technology to spot and block cryptojacking malware. Intel Threat Detection Technology (TDT) uses machine learning to analyse low level telemetry from the CPU’s performance monitoring subsystem to identify that cryptomining is happening and then signals Microsoft Defender to do something

Microsoft and Intel enhance Cryptojacking protection Read More »

Compromise of Codecov dev tools affects thousands of customers

An unauthorised change to a script used by Codecov customers to upload software test results has stolen the credentials and API tokens for thousands of organisation’s development environments. Codecov is a tool used to track what percentage of an application’s source code has been exercised during software testing. To do this, it is integrated into the

Compromise of Codecov dev tools affects thousands of customers Read More »

Scroll to Top