Search Results for: DNS Blog Post Persistent Linux Security Problem Enables DNS Cache Poisoning December 29, 2021 DNS cache poisoning vulnerability initially uncovered in 2008 still lives on, with the potential to cripple the internet as we... Blog Post What is DNS Spoofing? July 13, 2020 DNS Spoofing is a type of Cyber Security attack where a user accidentally navigates to an attacker’s website which is... Blog Post Are open ports a security risk? October 14, 2020 Ports are numbers that are used in TCP and UDP protocols for identification of applications. While some applications use well-known... Blog Post Perl.com Hijack: It Is No More A Safe Domain February 24, 2021 On January 27, 2021, the Perl Foundation announced that someone hijacked Perl.com, a famous Perl Programming Language website that started... Blog Post DNS Spoofing On The Rise During the Outbreak of COVID-19 May 22, 2020 A DNS spoofing attack is that an attacker pretends to be a DNS domain name server in response to a... Blog Post SecurityScorecard Discovers new botnet, ‘Zhadnost,’ responsible for Ukraine DDoS attacks March 10, 2022 Executive Summary SecurityScorecard (SSC) has identified three separate DDoS attacks which all targeted Ukrainian government and financial websites leading up... Blog Post Security Recommendations February 25, 2022 Our thoughts are with everyone across Europe, and the world, during these distressing times. Here are some general recommendations for... Blog Post Lemon Duck Hacking Group Adopts Microsoft Exchange Server Vulnerabilities in New Attacks May 26, 2021 A hacking group called Lemon Duck has engaged itself in exploiting Microsoft Exchange Server vulnerabilities and using decoy TLDs (top-level... Blog Post Microsoft Teams vulnerability could let attackers hijack user accounts April 28, 2020 Microsoft has issued an emergency patch to all versions of Windows in order to patch a vulnerability revealed after the recent Hacking Team breach. Blog Post Exchange/Outlook Autodiscover Bug Spills 100K+ Email Passwords October 20, 2021 A study conducted by Guardicore security researcher Amit Serper recently demonstrated the potential for large-scale credentials compromise owing to a... Blog Post What You Need to Know About DMARC September 2, 2020 In many phishing e-mails, there is a forged sender – an attacker claiming to have sent a message from an... Blog Post How does phishing bypass email filters? January 5, 2021 According to IBM, phishing still lies at the root of 14% of all data breaches, making it the 4th most... Blog Post A 17-year-old critical vulnerability discovered in Windows Server July 20, 2020 Security researchers from Check Point Research discovered a critical vulnerability in DNS Server component of Windows Server, which affects every... Blog Post DNS Hijacking Group ‘Sea Turtle’ Hits Over 40 Firms April 20, 2019 Researchers at Cisco’s Talos research division discovered a hacker group targeting web and email traffic of organizations around the globe.... Blog Post What is BendyBear? How to Counter the New Malware Cyberespionage Threat From China February 25, 2021 BendyBear malware is a stealth-focused Advanced Persistent Threat (APT) malware. Therefore, its main function is to lie undetected in infected...
Blog Post Persistent Linux Security Problem Enables DNS Cache Poisoning December 29, 2021 DNS cache poisoning vulnerability initially uncovered in 2008 still lives on, with the potential to cripple the internet as we...
Blog Post What is DNS Spoofing? July 13, 2020 DNS Spoofing is a type of Cyber Security attack where a user accidentally navigates to an attacker’s website which is...
Blog Post Are open ports a security risk? October 14, 2020 Ports are numbers that are used in TCP and UDP protocols for identification of applications. While some applications use well-known...
Blog Post Perl.com Hijack: It Is No More A Safe Domain February 24, 2021 On January 27, 2021, the Perl Foundation announced that someone hijacked Perl.com, a famous Perl Programming Language website that started...
Blog Post DNS Spoofing On The Rise During the Outbreak of COVID-19 May 22, 2020 A DNS spoofing attack is that an attacker pretends to be a DNS domain name server in response to a...
Blog Post SecurityScorecard Discovers new botnet, ‘Zhadnost,’ responsible for Ukraine DDoS attacks March 10, 2022 Executive Summary SecurityScorecard (SSC) has identified three separate DDoS attacks which all targeted Ukrainian government and financial websites leading up...
Blog Post Security Recommendations February 25, 2022 Our thoughts are with everyone across Europe, and the world, during these distressing times. Here are some general recommendations for...
Blog Post Lemon Duck Hacking Group Adopts Microsoft Exchange Server Vulnerabilities in New Attacks May 26, 2021 A hacking group called Lemon Duck has engaged itself in exploiting Microsoft Exchange Server vulnerabilities and using decoy TLDs (top-level...
Blog Post Microsoft Teams vulnerability could let attackers hijack user accounts April 28, 2020 Microsoft has issued an emergency patch to all versions of Windows in order to patch a vulnerability revealed after the recent Hacking Team breach.
Blog Post Exchange/Outlook Autodiscover Bug Spills 100K+ Email Passwords October 20, 2021 A study conducted by Guardicore security researcher Amit Serper recently demonstrated the potential for large-scale credentials compromise owing to a...
Blog Post What You Need to Know About DMARC September 2, 2020 In many phishing e-mails, there is a forged sender – an attacker claiming to have sent a message from an...
Blog Post How does phishing bypass email filters? January 5, 2021 According to IBM, phishing still lies at the root of 14% of all data breaches, making it the 4th most...
Blog Post A 17-year-old critical vulnerability discovered in Windows Server July 20, 2020 Security researchers from Check Point Research discovered a critical vulnerability in DNS Server component of Windows Server, which affects every...
Blog Post DNS Hijacking Group ‘Sea Turtle’ Hits Over 40 Firms April 20, 2019 Researchers at Cisco’s Talos research division discovered a hacker group targeting web and email traffic of organizations around the globe....
Blog Post What is BendyBear? How to Counter the New Malware Cyberespionage Threat From China February 25, 2021 BendyBear malware is a stealth-focused Advanced Persistent Threat (APT) malware. Therefore, its main function is to lie undetected in infected...