+44 (0)203 88 020 88

Author name: secureteampstg

LightNeuron malware targets Exchange servers

LightNeuron is a backdoor specifically designed to target Microsoft Exchange mail servers. It permits attackers to read and reroute all email passing through the server and execute commands on the server hidden in incoming email attachments. A recent paper published by ESET describes how the malware functions and the risks it poses. The researcher says: […]

LightNeuron malware targets Exchange servers Read More »

Cybercriminals shift focus from consumers to businesses

Compared to Q1 2018, malware detections in businesses has increased 235% while dropping 24% for consumers. Anti-virus and security firm Malwarebytes reports in their latest Cybercrime Tactics and Techniques report that cybercriminals are following the money and shifting their focus from consumers to businesses that have more valuable assets and possibly the financial resources to

Cybercriminals shift focus from consumers to businesses Read More »

Atlassian issues critical security advisory for Confluence

Many modern software factories adopting Agile development methodologies also take on the tools of Atlassian such as Jira to managed their feature backlog and Confluence for documentation.  A critical path traversal vulnerability has been discovered in the on-premises version of Confluence Server and Data Centre which will allow a remote user who has permission to

Atlassian issues critical security advisory for Confluence Read More »

cloud storage

Does your organisations data lurk in the shadows?

“Shadow IT” (also known as “Stealth IT”, “Client IT” or “What have those eejits in marketing done now?”) is the term used to describe IT systems which are developed and owned by business teams outside of the control or jurisdiction of an organisation’s IT department.  Usually initiated with pure intentions, these systems can pose a

Does your organisations data lurk in the shadows? Read More »

windows code signing

Microsoft improve code-signing on security updates with SHA-2

Microsoft is changing the way it digitally signs updates to Windows to improve protection against supply chain attacks – ensuring only valid original patches from Microsoft are installed through the Windows update utility. Currently, Windows patches are digitally-signed using both the SHA-1 and SHA-2 algorithms; however, because of known vulnerabilities in the SHA-1 hashing algorithm,

Microsoft improve code-signing on security updates with SHA-2 Read More »

Scroll to Top