Search Results for: malicious code Blog Post Latest Siemens PLC Vulnerability Could Let Hackers Execute Malicious Code Remotely June 23, 2021 Siemens ProductCERT recently released a Security Advisory warning of a memory protection bypass vulnerability present in its SIMATIC S7-1200 and... Blog Post What is Malvertising and How to Protect and Mitigate from it? July 7, 2020 In this cyber threats awareness post we will cover following topics: Malvertising vs Ad Malware How Malware inserted into ads?... Blog Post InkySquid State Actor Takes Advantage of Known IE (Internet Explorer) Bugs September 9, 2021 Cybersecurity researchers have recently claimed that they observed malicious code on a South Korean newspaper website named Daily NK. Shockingly,... Blog Post What is A Buffer Overflow Attack June 19, 2020 A common software coding mistake that an attacker could exploit to gain access and are responsible for many vulnerabilities in... Blog Post Over 1.6 million Devices Infected by Pink Botnet January 5, 2022 With the rise of remote and hybrid working, companies are finding it harder to secure the weak points in their... Blog Post Log4j Vulnerability Causes Panic Across the Internet December 14, 2021 The Log4j zero-day vulnerability is a considerable risk for internet security. Companies worldwide are scrambling to update their servers and... Blog Post Injection Attacks Explained April 24, 2020 Injections are amongst the oldest and most dangerous attacks aimed at web applications and can lead to data theft, data... Blog Post What Is Obfuscation In Security And What Types of Obfuscation Are There? November 26, 2020 Obfuscation is a mighty technique widely used by hackers as well as security teams all over the globe. They have... Blog Post Chrome Zero-Day Exploit Posted on Twitter – Patch Followed by Similar Exploit Days Later May 3, 2021 A rare Chrome zero-day exploit (remote code execution – RCE) was posted on Twitter earlier in April by security researcher,... Blog Post Widespread supply chain vulnerability exposed as security researcher hacks 35 tech giants March 2, 2021 Recently, an enterprising security researcher, Alex Birsan hacked tech companies and managed to pocket over $130,000 in security bounties. Birsan... Blog Post TrickBot Is Now Tidying Up Its Banking Trojan Module July 27, 2021 Alongside delivering ransomware, TrickBot reignites the bank fraud game. Usually, TrickBot alludes to a botnet and banking trojan to steal... Blog Post Can Mobile Devices get Malware? May 28, 2020 Mobile malware is malicious software which targets mobile devices, such as smartphones and tablets, with an aim of accessing private... Blog Post Chinese Hackers Compromising Critical Flaws in Microsoft Exchange Servers March 9, 2021 The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued a red warning for the users of the Microsoft Exchange email... Blog Post A 17-year-old critical vulnerability discovered in Windows Server July 20, 2020 Security researchers from Check Point Research discovered a critical vulnerability in DNS Server component of Windows Server, which affects every... Blog Post These Threats Are Still Exploiting Vulnerable Exchange Servers April 14, 2021 The exploitation of vulnerabilities in the Microsoft Exchange Server disclosed in March does not cease despite authorities’ calls for updates....
Blog Post Latest Siemens PLC Vulnerability Could Let Hackers Execute Malicious Code Remotely June 23, 2021 Siemens ProductCERT recently released a Security Advisory warning of a memory protection bypass vulnerability present in its SIMATIC S7-1200 and...
Blog Post What is Malvertising and How to Protect and Mitigate from it? July 7, 2020 In this cyber threats awareness post we will cover following topics: Malvertising vs Ad Malware How Malware inserted into ads?...
Blog Post InkySquid State Actor Takes Advantage of Known IE (Internet Explorer) Bugs September 9, 2021 Cybersecurity researchers have recently claimed that they observed malicious code on a South Korean newspaper website named Daily NK. Shockingly,...
Blog Post What is A Buffer Overflow Attack June 19, 2020 A common software coding mistake that an attacker could exploit to gain access and are responsible for many vulnerabilities in...
Blog Post Over 1.6 million Devices Infected by Pink Botnet January 5, 2022 With the rise of remote and hybrid working, companies are finding it harder to secure the weak points in their...
Blog Post Log4j Vulnerability Causes Panic Across the Internet December 14, 2021 The Log4j zero-day vulnerability is a considerable risk for internet security. Companies worldwide are scrambling to update their servers and...
Blog Post Injection Attacks Explained April 24, 2020 Injections are amongst the oldest and most dangerous attacks aimed at web applications and can lead to data theft, data...
Blog Post What Is Obfuscation In Security And What Types of Obfuscation Are There? November 26, 2020 Obfuscation is a mighty technique widely used by hackers as well as security teams all over the globe. They have...
Blog Post Chrome Zero-Day Exploit Posted on Twitter – Patch Followed by Similar Exploit Days Later May 3, 2021 A rare Chrome zero-day exploit (remote code execution – RCE) was posted on Twitter earlier in April by security researcher,...
Blog Post Widespread supply chain vulnerability exposed as security researcher hacks 35 tech giants March 2, 2021 Recently, an enterprising security researcher, Alex Birsan hacked tech companies and managed to pocket over $130,000 in security bounties. Birsan...
Blog Post TrickBot Is Now Tidying Up Its Banking Trojan Module July 27, 2021 Alongside delivering ransomware, TrickBot reignites the bank fraud game. Usually, TrickBot alludes to a botnet and banking trojan to steal...
Blog Post Can Mobile Devices get Malware? May 28, 2020 Mobile malware is malicious software which targets mobile devices, such as smartphones and tablets, with an aim of accessing private...
Blog Post Chinese Hackers Compromising Critical Flaws in Microsoft Exchange Servers March 9, 2021 The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued a red warning for the users of the Microsoft Exchange email...
Blog Post A 17-year-old critical vulnerability discovered in Windows Server July 20, 2020 Security researchers from Check Point Research discovered a critical vulnerability in DNS Server component of Windows Server, which affects every...
Blog Post These Threats Are Still Exploiting Vulnerable Exchange Servers April 14, 2021 The exploitation of vulnerabilities in the Microsoft Exchange Server disclosed in March does not cease despite authorities’ calls for updates....