+44 (0)203 88 020 88

Menu

Search

News

Critical Domain Controller Flaw Requires Urgent Patching

A critical vulnerability in Microsoft Netlogon was patched in the August patch cycle – but was so dangerous that details were not made public until September when (hopefully) many systems would have been patched.  If you have not applied the August patch bundle to your domain controllers stop reading and go do it now. Really […]

Critical Domain Controller Flaw Requires Urgent Patching Read More »

NCSC Publishes Vulnerability Disclosure Toolkit

The UK National Cyber-Security Centre has published a toolkit to help organisations setup a vulnerability disclosure programme. A vulnerability disclosure programme makes it easy for someone to provide your organisation with information if they notice a vulnerability that could impact your security.  Without such a programme in place, concerned clients or researchers have to resort

NCSC Publishes Vulnerability Disclosure Toolkit Read More »

Pass-the-hash attack discovered in Windows Themes

A new vector for pass-the-hash attacks has been discovered targeting Windows 10 personalisation themes. A security researcher has published details of a potential issue with the design of Windows 10 themes that can be exploited to harvest Windows and Microsoft Account login credentials. A Windows 10 theme is a collection of customisation settings for Windows

Pass-the-hash attack discovered in Windows Themes Read More »

Microsoft Launches Application Guard preview

Microsoft Application Guard helps protect against malware in Office documents by opening each document in its own segregated virtual machine. Microsoft says in the release notes: Application Guard is a virtualization-based sandbox that’s used to isolate untrusted documents you may encounter. It brings the same technology that powers Azure to your desktop. Untrusted documents are

Microsoft Launches Application Guard preview Read More »

RDP Based Attacks Increase During Lockdown

The number of ransomware attacks using RDP as the attack vector has increased sharply during the COVID lockdown. As the number of staff working remotely exploded during the COVID lockdown, criminals were quick to respond by targeting Remote Desktop Protocol services with ransomware.  For example, Group-IB recently reported that the Dharma ransomware-as-a-service was being used

RDP Based Attacks Increase During Lockdown Read More »

0

No products in the basket.

No products in the basket.