+44 (0)203 88 020 88

News

Azure developers targeted in supply chain attack

Last week over 200 malicious packages were discovered in the npm registry targeting Azure developers with PII stealing malware. Reported by security firm JFrog, the malicious packages were uploaded to npm in a sort of typosquatting attack which targeted packages within the @azure scope. The attack method is simple: the attacker creates a malicious package […]

Azure developers targeted in supply chain attack Read More »

HP warns of printer vulnerabilities

HP has issued two security advisories describing remote code execution and denial of service vulnerabilities that affect hundreds of different HP network printers. Remote code execution and buffer overflow Certain HP Print products and Digital Sending products may be vulnerable to potential remote code execution and buffer overflow with use of Link-Local Multicast Name Resolution

HP warns of printer vulnerabilities Read More »

March Security Updates

Our monthly summary of recent important security patches includes updates from Microsoft and HP Microsoft Patch Tuesday March 2022 The March security updates from Microsoft address 71 security vulnerabilities, including several rated as critical or zero-day: Microsoft Exchange Server remote code execution vulnerability ( CVE-2022-23277) allowing an authenticated malicious user to run their code with admin

March Security Updates Read More »

Phone systems abused to generate record breaking DDoS attacks

Akamai has published details of a DDoS attack which generated more than 53 million packets per second by abusing misconfigured PBX VoIP gateways. Amplification DDoS attacks work by abusing systems which send large responses to small queries.  Thus, an attacker can transmit a number of small requests which have the ‘reply-to’ address set to the

Phone systems abused to generate record breaking DDoS attacks Read More »

These are the vulnerabilities being targeted today

The US Cybersecurity and Infrastructure Security Agency (CISA) maintains a list of known vulnerabilities that are the most commonly exploited by threat actors.  At the start of March the list was extended by another 95 bugs including several critical Cisco vulnerabilities. The known exploited vulnerabilities catlog is part of the CISA’s Shields-Up initiative that provides

These are the vulnerabilities being targeted today Read More »

Scroll to Top