+44 (0)203 88 020 88

Menu

Search

Vulnerabilities

Microsoft warns Office 365 targeted by zero-day RCE

A zero-day Remote Code Execution attack targeting Office 365 and Office 2019 users has prompted Microsoft to issue a security advisory with a workaround to protect your network until a patch is available. According to the security advisory released by Microsoft: Microsoft is investigating reports of a remote code execution vulnerability in MSHTML that affects

Microsoft warns Office 365 targeted by zero-day RCE Read More »

Yet another Exchange Server vulnerability

Details have emerged of (another) Exchange Server vulnerability, called ProxyToken, which allows an attacker to reconfigure an Exchange server remotely without needing to know any passwords. Reported by the Zero Day Initiative the vulnerability affects Exchange server versions 2013 through 2019: With this vulnerability, an unauthenticated attacker can perform configuration actions on mailboxes belonging to

Yet another Exchange Server vulnerability Read More »

PrintNightmare vulnerabilities exploited in the wild

Cyber-criminals have been exploiting the Windows PrintNightmare vulnerability to attack networks around the world.  PrintNightmare is the name given to a collection of vulnerabilities in the Windows Print Spooler. According to reports from Talos and CrowdStrike, several threat actors have now incorporated the PrintNightmare vulnerabilities into attacks on their victims networks. The PrintNightmare vulnerabilities were

PrintNightmare vulnerabilities exploited in the wild Read More »

VPN insecurity woes continue for Pulse Secure and Cisco

Cisco and Pulse Secure have both issued security advisories warning of critical Remote Code Execution vulnerabilities that affect some of their VPN servers. Pulse Secure Pulse Secure has shipped a patch to resolve several Remote Code Execution vulnerabilities in its Connect Secure VPN appliances.  The August release addresses these issues and the vendor ‘strongly advises’

VPN insecurity woes continue for Pulse Secure and Cisco Read More »

PetitPotam attack leaves Windows Domain Controllers Vulnerable

Microsoft has moved swiftly to publish mitigation advice for a new NTLM relay attack against Windows Domain controllers, dubbed PetitPotam. An NTLM relay attack can occur when an attacker inserts themselves between a valid client-server authentication request in a Windows Domain or tricks one system into trying to authenticate itself and so providing a copy

PetitPotam attack leaves Windows Domain Controllers Vulnerable Read More »

16 year old printer bug exposes millions of systems

SentinelLabs has discovered a severe escalation of privilege vulnerability in a printer driver used by HP, Samsung and Xerox devices since 2005 – affecting over 390 printer models and millions of computers. The vulnerable driver gets installed on Windows systems without any user intervention, simply by plugging in a printer with a USB cable or

16 year old printer bug exposes millions of systems Read More »

0

No products in the basket.

No products in the basket.