GNOME Remote Desktop Vulnerability
28
May
2024

Researcher Exploited Nexus Repository Directory Traversal Vulnerability

Hackers target and exploit GitHub repositories for a multitude of reasons and illicit purposes. The widespread use of GitHub and…

Fake Antivirus Sites Spread Malware Disguised as Avast, Malwarebytes, Bitdefender
28
May
2024

Fake Antivirus Sites Spread Malware Disguised as Avast, Malwarebytes, Bitdefender

Trellix research exposes the dangers of fake antivirus websites disguised as legitimate security software but harbouring malware. Learn how to…

Protecting Critical Assets
28
May
2024

4-Step Approach to Mapping and Securing Your Organization’s Most Critical Assets

You’re probably familiar with the term “critical assets”. These are the technology assets within your company’s IT infrastructure that are…

Government appoints investigators to analyse Post Office Capture software used before Horizon
28
May
2024

Government appoints investigators to analyse Post Office Capture software used before Horizon

The government is bringing in specialist investigators to examine whether a Post Office software application in use during the 1990s…

WAF Bypass Using Burp Plugin
28
May
2024

Researchers Detailed WAF Bypass Techniques With Burp Plugin

Security experts have disclosed advanced methods for bypassing Web Application Firewalls (WAFs) on a large scale, and they have also…

GNOME Remote Desktop Vulnerability
28
May
2024

DDNS Service Or QNAP Embed Devices Exposes Sensitive Data

Hackers employ DNS for various purposes like redirecting traffic to enable man-in-the-middle attacks, infecting malware through harmful sites, and flooding…

What is an Infosec Audit and Why Does Your Company Need One?
28
May
2024

What is an Infosec Audit and Why Does Your Company Need One?

Uncover IT security weaknesses and ensure compliance with infosec audits. Regular audits protect your data from breaches & meet regulations….

CatDDoS Botnet and DNSBomb DDoS Attack
28
May
2024

Researchers Warn of CatDDoS Botnet and DNSBomb DDoS Attack Technique

The threat actors behind the CatDDoS malware botnet have exploited over 80 known security flaws in various software over the…

Post Office scandal: Met Police investigation set to go national
28
May
2024

Post Office scandal: Met Police investigation set to go national

The Metropolitan Police has confirmed it is setting up a national investigation into the Post Office scandal, although it could…

Cencora Data Breach Far More Widespread Than Earlier Thought
28
May
2024

Cencora Data Breach Far More Widespread Than Earlier Thought

The impact of the Cencora data breach is far more widespread than earlier thought as more than a dozen pharmaceutical…

Decathlon data leak
28
May
2024

Decathlon Data Leak: Employees Info Potentially Exposed

A recent data breach has reportedly compromised the personal information of Decathlon employees in Spain. The threat actor known as…

Zscaler Client Connector Zero-interaction Privilege Escalation Vulnerability
28
May
2024

Zscaler Client Connector Zero-interaction Privilege Escalation Vulnerability

A new privilege escalation vulnerability has been discovered in Zscaler Client Connector, combining three different vulnerabilities. The three vulnerabilities were…