Multiple Agency Announcement on APT Actors Exploiting Zoho ManageEngine ADSelfService Plus (AA21-259A)
On September 16th, the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and United States Coast Guard Cyber Command (CGCYBER) released...
A Vulnerability in Polkit’s pkexec Component Could Allow For Local Privilege Escalation
A vulnerability in Polkit's pkexec component could allow for local privilege escalation. Polkit (formerly PolicyKit) is a component for controlling system-wide privileges in Unix-like operating...
A Vulnerability in F5Networks BIG-IP Could Allow for Denial of Service
A vulnerability has been discovered in F5Networks BIG-IP, which could result in a denial-of-service (DoS). BIG-IP is a family of products covering software and hardware...
A Backdoor in WordPress AccessPress Plugins and Themes Could Allow an Attacker Access to a Targeted Website
A backdoor has been discovered in WordPress AccessPress plugins and themes, which could allow an attacker access to a targeted website. AccessPress plugins and themes...
Multiple Vulnerabilities in Cisco Products Could Allow for Arbitrary Code Execution
Multiple vulnerabilities have been discovered in Cisco Products, the most severe of which could allow for arbitrary code execution. Successful exploitation of the most severe...
Two-Fifths of Ransomware Victims Still Paying Up
Two-Fifths of Ransomware Victims Still Paying Up Two-fifths (39%) of ransomware victims paid their extorters over the past three years, with the majority of these...
#COVID19 Phishing Emails Surge 500% on Omicron Concerns
#COVID19 Phishing Emails Surge 500% on Omicron Concerns The latest COVID-19 variant has led to a 521% increase in phishing attacks using the virus as...
Merck Wins $1.4bn NotPetya Payout from Insurer
Merck Wins $1.4bn NotPetya Payout from Insurer Merck has won a long-running legal battle to force its insurer to cover the costs of damages caused...
Footprinting
The first step in a cyberattack, or a penetration test, is footprinting. The attacker/analyst tries to get information about the targeted infrastructure. Thanks to footprinting...
Cyberbullying: Words do Hurt When it Comes to Social Media
Most parents may find it difficult to relate to today’s form of cyberbullying. That’s because, for many of us, bullying might have come in a...