Securing Your Windows 10 Stand-alone Systems Just Got Easier
We're excited to announce a draft of CIS Microsoft Windows 10 Stand-alone Benchmark v1.0.0 for all versions of Windows 10. Read More
Drone Deliveries into Prisons
Seems it’s now common to sneak contraband into prisons with a drone. Read More
T-Mobile Retailer Guilty of $25m Fraud Scheme
Case highlights continued threat from social engineering Read More
Tips to prevent RDP and other remote attacks on Microsoft networks
One long-favored way that ransomware enters your system is through Microsoft’s Remote Desktop Protocol (RDP) attacks. Years ago when we used Microsoft’s Terminal Services (from...
Tory Leadership Voting Delayed Over Security Concerns
National Cyber Security Centre raises the alarm Read More
DDoS Attacks Pepper Taiwanese Government Sites
Campaign coincides with speaker Pelosi’s trip Read More
ZDI-22-1039: (Pwn2Own) ICONICS GENESIS64 TDFX File Parsing Exposed Dangerous Function Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of ICONICS GENESIS64. User interaction is required to exploit this vulnerability in that...
ZDI-22-1040: (Pwn2Own) ICONICS GENESIS64 ColorPaletteEntry Deserialization of Untrusted Data Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of ICONICS GENESIS64. User interaction is required to exploit this vulnerability in that...
ZDI-22-1041: (Pwn2Own) ICONICS GENESIS64 genbroker64 Use-After-Free Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of ICONICS GENESIS64. Authentication is not required to exploit this vulnerability. Read More
ZDI-22-1042: ICONICS GENESIS64 colorpalletes Directory Traversal Information Disclosure Vulnerability
This vulnerability allows remote attackers to disclose sensitive information on affected installations of ICONICS GENESIS64. Authentication is not required to exploit this vulnerability. Read More