Trusted Cyber Security Experts
25+ Years Industry Experience
Ethical, Professional & Pragmatic
Stack-Based Buffer Overflows in Ivanti Avalanche
Multiple stack-based buffer overflows have been identified in Ivanti Avalanche, tracked as a single vulnerability with a critical severity rating and CVSS base score of 9.8/10. Ivanti Avalanche is an
Microsoft Teams Used in Social Engineering Attacks
Highly targeted phishing attacks have been carried out by the threat actor Midnight Blizzard, previously known as NOBELIUM, via Microsoft Teams. These attacks targeted a range of organisations including government
LinkedIn Accounts Hijacked By Cyber Criminals
LinkedIn accounts have been targeted by attackers in hacking events that have led to users being locked out of their own accounts by LinkedIn, and unable to recover them through
Malware Attacks Target Zyxel End-Of-Life Routers
A five-year-old vulnerability is currently being exploited in Zyxel P660HN-T1A routers to introduce a Gafgyt malware variant onto target networks. An outbreak alert has been issued by Fortinet to inform
Actively Exploited Office RCE Attack Chain Patched
A Defense-In-Depth Office update has been released by Microsoft as a part of the Patch Tuesday updates made available this week to fix an actively exploited remote code execution (RCE)
PaperCut Flaw Allows RCE on Windows Servers
A critical severity flaw in PaperCut NG and PaperCut MF print management applications that can allow unauthenticated attackers to perform remote code execution (RCE) on vulnerable Windows servers. Any use
Zimbra Collaboration Suite Patch Zero-Day Flaw
A zero-day cross-site scripting (XSS) flaw that has been exploited in the wild has now been patched for Zimbra Collaboration Suite in version 8.8.15 patch 41. Two other vulnerabilities have
Canon Printers Retain Wi-Fi Information After Wipe
Canon Inkjet printers have been found to retain sensitive Wi-Fi information after the usual wipe that is performed in the initialisation process. Canon have released a security advisory to warn
Microsoft Key Used for Unauthorised Email Access
The threat actor tracked by Microsoft as Storm-0558 has been able to utilise a stolen consumer signing key to access accounts and emails in Exchange Online through Outlook Web Access
Ivanti Patch Actively Exploited EPMM Zero-Day Flaw
An actively exploited vulnerability has been patched in that latest updates for Ivanti Endpoint Manager Mobile (EPMM), previously known as MobileIron Core. This zero-day flaw affects all supported versions of
Unpatched Redis Servers Targeted by P2P Malware
A peer-to-peer (P2P) worm known as P2PInfect has been discovered by security researchers at Unit42 to be actively targeting Windows and Linux based Redis servers. Redis is an open-source database
Citrix ADC and Gateway RCE Vulnerability Exploited
A critical severity Citrix ADC and Citrix Gateway remote code execution (RCE) flaw has been confirmed to be exploited in the wild. Now known as NetScaler ADC and NetScaler Gateway,
Subscribe to our monthly newsletter today
If you’d like to stay up-to-date with the latest cyber security news and articles from our technical team, you can sign up to our monthly newsletter.
We hate spam as much as you do, so we promise not to bombard you with emails. We’ll send you a single, curated email each month that contains all of our cyber security news and articles for that month.