Risk counts for Cyber and here is why
Risk is one of those standard terms within cybersecurity that, when asked to define, many struggle to explain what risk is and how it applies...
American Airlines Breach Exposes Customer and Staff Information
An undisclosed number of people have been impacted Read More
Revolut Breach May Have Hit 50,000+ Customers
Major phishing risk as personal details are compromised Read More
Watch Out for These 3 Online Job Scams
If you recently found yourself looking for a new job, you are far from alone. According to the Institute of Labor Economics, more Canadians were seeking new employment...
Most common SAP vulnerabilities attackers try to exploit
Unpatched vulnerabilities, common misconfigurations and hidden flaws in custom code continue to make enterprise SAP applications a target rich environment for attackers at a time...
Uber Blames Lapsus$ for Breach
Threat actor bombarded Uber contractor with 2FA requests Read More
ZDI-22-1293: FreeBSD Kernel MPT Heap-based Buffer Overflow Privilege Escalation Vulnerability
This vulnerability allows local attackers to escalate privileges on affected installations of FreeBSD Kernel. An attacker must first obtain the ability to execute high-privileged code...
ZDI-22-1294: FreeBSD Kernel MPT Heap-based Buffer Overflow Privilege Escalation Vulnerability
This vulnerability allows local attackers to escalate privileges on affected installations of FreeBSD Kernel. An attacker must first obtain the ability to execute high-privileged code...
ZDI-22-1290: D-Link Multiple Routers lighttpd Stack-based Buffer Overflow Remote Code Execution Vulnerability
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of multiple D-Link routers. Authentication is not required to exploit this vulnerability. Read...
ZDI-22-1291: FreeBSD Kernel Netmap Time-Of-Check Time-Of-Use Privilege Escalation Vulnerability
This vulnerability allows local attackers to escalate privileges on affected installations of FreeBSD Kernel. An attacker must first obtain the ability to execute high-privileged code...