Smashing Security podcast #277: Bad bots, cheeky ransoms, and good deepfakes
Ransom acts of kindness are top of our mind, as we also explore how bad bots are hogging more and more of the internet's activity,...
ZDI-22-813: Microsoft Word glTF-SDK Integer Overflow Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Word. User interaction is required to exploit this vulnerability in that...
Multiple Vulnerabilities in Mozilla Products Could Allow for Arbitrary Code Execution
Multiple vulnerabilities have been discovered in Mozilla Firefox, Firefox Extended Support Release (ESR) and Mozilla Thunderbird, the most severe of which could allow for arbitrary...
CIS Benchmarks June 2022 Update
The CIS Benchmarks development team has been hard at work preparing several brand new Benchmarks and updates for June 2022. Read More
5 ways to prevent Ransomware attacks
This blog was written by an independent guest blogger. “Ransomware has become the enemy of the day; the threat that was first feared on Pennsylvania...
Clever — and Exploitable — Windows Zero-Day
Researchers have reported a still-unpatched Windows zero-day that is currently being exploited in the wild. Here’s the advisory, which includes a work-around until a patch...
Europol Confirms Takedown of SMS-based FluBot Spyware
The action was prompted by the Android malware spreading aggressively through SMS around the world Read More
CVE-2021-27914
A cross-site scripting (XSS) vulnerability in the installer component of Mautic before 4.3.0 allows admins to inject executable javascript Read More
How Can We Strengthen the Cybersecurity of Critical Infrastructure? Here Are My Suggestions for CISOs, Regulators, Vendors – and All Citizens
A year after the ransomware attack against the Colonial Pipeline, what can we do to further harden the IT and OT systems of power plants,...
Logic bomb attacks: 4 famous examples
What is a logic bomb? A logic bomb is a piece of code left lying in wait on a computer that will execute under certain...