How to manage privileged users in IT
This blog was written by an independent guest blogger. Privileged users are the key to the information system. The operation of information systems and the...
How blockchain investigations work
When Colonial Pipeline was hit by ransomware on May 7, 2021, it paid 75 bitcoins to restore its systems. But the money was not entirely...
The Ukraine/Russia information war is forcing companies to choose a side
The Russian invasion of Ukraine has a very visible aspect as we see Ukrainians stand and fight the Russian military might. The geopolitical landscape is...
Ghostwriter Group Targets NATO Refugee Effort
Proofpoint warns of new phishing campaign from Belarusian state Read More
Nvidia Admits Hackers Stole Employee and Internal Data
Attackers claim to have IP which could increase capacity for crypto-mining Read More
Apple and Google Turn Off Map Features to Help Ukraine
Tech giants also follow Meta in cracking down on Kremlin propaganda Read More
ZDI-22-429: Adobe FrameMaker TIF File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Adobe FrameMaker. User interaction is required to exploit this vulnerability in that...
ZDI-22-430: Adobe Photoshop TIF File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Adobe Photoshop. User interaction is required to exploit this vulnerability in that...
Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution
Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution. Google Chrome is a web browser...
A Vulnerability in Mitel MiCollab and MiVoice Business Express Could Allow for Unauthorized Disclosure of Data
A vulnerability has been discovered in Mitel MiCollab and MiVoice Business Express, which could allow for the unauthorized disclosure of data as well as result...