+44 (0)203 88 020 88

Menu

Search

patching

These are the vulnerabilities being targeted today

The US Cybersecurity and Infrastructure Security Agency (CISA) maintains a list of known vulnerabilities that are the most commonly exploited by threat actors.  At the start of March the list was extended by another 95 bugs including several critical Cisco vulnerabilities. The known exploited vulnerabilities catlog is part of the CISA’s Shields-Up initiative that provides […]

These are the vulnerabilities being targeted today Read More »

Samba RCE vulnerability

A serious remote code execution vulnerability has been discovered in the Samba file sharing software.  This bug allows an unauthenticated attacker to execute arbitrary code as root on an affected server.  With a CVSS score of 9.9, this vulnerability affects Samba’s default configurations. Samba is a popular freeware utility that supports the SMB (Server Message

Samba RCE vulnerability Read More »

Install patches to protect Domain Controllers warns Microsoft

Proof of Concept code has been published showing how to exploit two vulnerabilities that would allow an attacker to obtain domain admin privilege on your Windows Domain Controllers. In the November security patch bundle, Microsoft released patches to resolve two vulnerabilities ( CVE-2021-42287 and CVE-2021-42278 ) in the Windows Active Directory Domain Services.  On December 12th a proof

Install patches to protect Domain Controllers warns Microsoft Read More »

Attackers rapidly target Microsoft vulnerabilities

This week there have been several exploits published that target recently published (and patched) vulnerabilities in Microsoft Exchange Server and Windows 10/11 systems. Coming just a week after Microsoft published patches for these vulnerabilities, already proof of concept code has been made available on GitHub and threat actors have started targeting the exploits hoping to

Attackers rapidly target Microsoft vulnerabilities Read More »

0

No products in the basket.

No products in the basket.