+44 (0)203 88 020 88

News

vulnerable cisco switch router

Critical vulnerabilities affect Cisco WAN VPN Routers and Small Business Switches

Remote access attacks allow authentication bypass and remote code execution Cisco has just released urgent patches for their RV320 and RV325 WAN VPN routers.  The patches resolve two critical vulnerabilities in the router’s firmware: CVE-2019-1653 – allows a remote attacker to get sensitive device configuration details without a password (including the hashed passwords for all […]

Critical vulnerabilities affect Cisco WAN VPN Routers and Small Business Switches Read More »

Extensive DNS hijack attacks prompt urgent action

A wave of DNS hijack attacks has been sweeping across Europe, the Middle-East and America according to recently published reports from FireEye and Cisco.  While the attacks are creative and sophisticated, the root attack vector is often a simple credential compromise to the DNS control panel of an organisation’s domain name registrar.  The scale of

Extensive DNS hijack attacks prompt urgent action Read More »

coinbase cryptocurrency

Ethereum Classic hack raises blockchain questions

51% Attack succeeds and over $1million Ethereum Classic is double spent The cornerstone design assumption in blockchain systems such as Bitcoin and Ethereum is that there is a large community pool of honest participants who mutually concur and authenticate blockchain events.  Page 3 of Satoshi Nakamoto’s original whitepaper titled: “Bitcoin: A Peer-to-Peer Electronic Cash System”

Ethereum Classic hack raises blockchain questions Read More »

microchip vulnerability

Vulnerability in Wifi Chip used in Microsoft, Samsung and Sony devices allows zero click remote code execution  

Security research firm Embedi has recently published a report on the Marvell Avastar Wifi chip used in many devices including Microsoft Surface and Surface Pro, Samsung Chromebooks and some Samsung phones and the Sony Playstation 4 to name but a few. The flaw in Marvell’s implementation of the ThreadX operating system running on the Wifi

Vulnerability in Wifi Chip used in Microsoft, Samsung and Sony devices allows zero click remote code execution   Read More »

chromecast vulnerability upnp

Chromecast design flaw exposes digital signage screens to takeover

A recent publicity stunt promoting YouTube scoundrel pewdiepie has brought attention to a design flaw in Google Chromecast devices and smartTVs that embed the Chromecast technology.  By default, the Chromecast device will attempt to use Universal Plug and Play if it is enabled on the network router in order to open a port on the

Chromecast design flaw exposes digital signage screens to takeover Read More »

svg phishing attack fonts

New Phishing techniques avoid detection with fake web fonts

Endpoints and security gateway appliances use a variety of techniques to attempt to identify Phishing websites that are trying to steal login credentials from unsuspecting users. A typical phishing website may appear to the average human to be a login page for a well-known service, such as Gmail, Dropbox or your cloud-hosted ERP system.  Users

New Phishing techniques avoid detection with fake web fonts Read More »

ipmi server management

Server IPMI remote management cards used as ransomware attack vector

Many servers make use of Intel’s Intelligent Platform Management Interface (IPMI) cards. These allow system administrators to access and remotely manage the server; including, changing BIOS settings, rebooting the server and providing an out-of-band login to the local system console. The IPMI can be built into the motherboard or can be added later and is supported

Server IPMI remote management cards used as ransomware attack vector Read More »

microsoft patch tuesday december

Death by PowerPoint and other vulnerabilities

Microsoft’s December 2018 patch Tuesday release includes fixes for several critical vulnerabilities including one in PowerPoint which affects all versions since PowerPoint 2010. The PowerPoint bug (CVE-2018-8628) would allow an attacker to create a specially-crafted file, which when opened by PowerPoint, would enable the attacker to run arbitrary code as the logged-in user.   According to

Death by PowerPoint and other vulnerabilities Read More »

sennheiser headphones vulnerability

Sennheiser headphone bug highlights certificate vulnerability

A recent vulnerability in Sennheiser’s headphone management utility illustrates the risk of unexpected additions to the Microsoft windows certificate store. During installation, the Sennheiser software installed a self-signed root certificate into the computer’s trusted root CA certificate store. A copy of the certificates’ private key was also copied into application’s installation directory.  Security research firm

Sennheiser headphone bug highlights certificate vulnerability Read More »

Scroll to Top