Three-quarters of Security Pros Believe Current Cybersecurity Strategies Will Shortly Be Obsolete
New research shows companies are falling behind when it comes to developing strategies to protect themselves against cyber-attacks Read More
7 top privileged access management tools
One of the main objectives of the bad guys is to escalate to privileged account access wherever possible. The more unfettered access they can gain...
Remote bricking of Ukrainian tractors raises agriculture security concerns
Against the backdrop of horrific reports from Russia's Ukraine invasion, an encouraging story emerged earlier this month when unidentified Ukrainians remotely disabled tractors worth $5...
State of Cybersecurity Report 2022 Names Ransomware and Nation-State Attacks As Biggest Threats
Ransomware, nation-state attacks, and supply chains were cited as the biggest threats in the Infosecurity Group's annual report Read More
Crypto Scammers Exploit: Elon Musk Speaks on Cryptocurrency
By Oliver Devane Update: In the past 24 hours (from time of publication) McAfee has identified 15 more scam sites bringing the total to 26....
ZDI-22-811: [INTERNAL] Apple macOS PackageKit PKInstallSandbox SIP Bypass vulnerability
This vulnerability allows Read More
ZDI-22-812: Apple macOS SCPT File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Apple macOS. User interaction is required to exploit this vulnerability in that...
ZDI-22-788: Ivanti Avalanche SetSettings Exposed Dangerous Function Authentication Bypass Vulnerability
This vulnerability allows remote attackers to bypass authentication on affected installations of Ivanti Avalanche. Authentication is not required to exploit this vulnerability. Read More
ZDI-22-789: Trend Micro Maximum Security Link Following Arbitrary File Deletion Vulnerability
This vulnerability allows local attackers to delete arbitrary files on affected installations of Trend Micro Maximum Security. An attacker must first obtain the ability to...
ZDI-22-790: Trend Micro Apex One Incorrect Permission Assignment Local Privilege Escalation Vulnerability
This vulnerability allows local attackers to escalate privileges on affected installations of Trend Micro Apex One. An attacker must first obtain the ability to execute...