3 Zero-Day in SonicWall Enterprise Email Security Appliances actively exploited
Security vendor SonicWall has addressed three zero-day vulnerabilities affecting both its on-premises and hosted Email Security products. SonicWall is warning its customers to update their hosted and on-premises email security products to…
Patchstack Protects The Web With Community
By Oliver Sild, the co-founder and CEO of Patchstack Web applications today are built with heavy use of open source code – all of which is largely put together by…
Gap of The Red Team from The Leak of Fireeye
Use “Imaginary Enemy” methodology to mitigate APT Attack By Jamal Uddin Shaikh, Cybersecurity Architect and Technology Lead , Appxone Introduction Early in the morning, I was pulled up by the…
XCSSET malware now targets macOS 11 and M1-based Macs
XCSSET, a Mac malware targeting Xcode developers, was now re-engineered and employed in a campaign aimed at Apple’s new M1 chips. Experts from Trend Micro have uncovered a Mac malware…
How to Become Unattractive for Cybercriminals
Map, monitor and manage your attack surface to stay a step ahead By Stijn Vande Casteele, Founder and CEO, Sweepatic All organizations rely heavily on web presence to display their…
Microsoft fixes 2 critical Exchange Server flaws reported by the NSA
Microsoft patch Tuesday security updates address four high and critical vulnerabilities in Microsoft Exchange Server that were reported by the NSA. Microsoft patch Tuesday security updates released today have addressed…
Malware Evasion Techniques
By Stas Gaivoronskii, Malware Analyst at ANY.RUN Cybercriminals create new ways to make malware invisible for detection. They hide malicious indicators and behavior during analysis. Researchers need to know about…
Expert publicly released Chromium-based browsers exploit demonstrated at Pwn2Own 2021
An Indian security researcher has published a proof-of-concept (PoC) exploit code for a vulnerability impacting Google Chrome and other Chromium-based browsers. The Indian security researcher Rajvardhan Agarwal has publicly released…
Monetising Customer Data Without Their Knowledge Is Unethical and Must Stop By Sridhar Iyengar, MD, Zoho Europe
By Sridhar Iyengar, MD, Zoho Europe Large tech corporations have started turning into surveillance companies, tracking the behaviour of businesses and users who have become heavily reliant on their services…
This man was planning to kill 70% of Internet in a bomb attack against AWS
The FBI arrested a man for allegedly planning a bomb attack against Amazon Web Services (AWS) to kill about 70% of the internet. The FBI arrested Seth Aaron Pendley (28),…
Ubiquiti security breach may be a catastrophe
The data breach disclosed by Ubiquiti in January could be just the tip of the iceberg, a deeper incident could have hit the company. In January, American technology vendor Ubiquiti…
Rise of BYOD Once Again
By Nicole Allen, Marketing Executive, SaltDNA. The sudden increase in remote working has ensured that ‘bring your own device’ (BYOD) is once again a hot topic, as the workforce relies on a number…