Rapid7 Announces Release of New tCell Amazon CloudFront Agent
Cloud-native approaches to building, hosting, and delivering web applications are growing rapidly. Content delivery networks (CDNs) such as Amazon CloudFront...
Cloud-native approaches to building, hosting, and delivering web applications are growing rapidly. Content delivery networks (CDNs) such as Amazon CloudFront...
Microsoft released an Exchange On-premises Mitigation Tool (EOMT) tool to small businesses for the fix of ProxyLogon vulnerabilities. On March...
Microsoft is reportedly investigating whether the recent attacks against Microsoft Exchange servers could be linked to information leaked by a...
The CEO of the encrypted communications firm Sky Global has been indicted in the US on charges of facilitating international...
Summary: Microsoft Visio Security Feature Bypass Vulnerability Reference Links(if available): https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27055 CVSS Score (if available) v2: / MEDIUM v3: /...
Summary: Windows 10 Update Assistant Elevation of Privilege Vulnerability Reference Links(if available): https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27070 CVSS Score (if available) v2: / MEDIUM...
Summary: Windows DNS Server Denial of Service Vulnerability This CVE ID is unique from CVE-2021-26896. Reference Links(if available): https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27063 CVSS...
Summary: Microsoft Excel Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-27054. Reference Links(if available): https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27053 CVSS Score...
Summary: In affected versions of dojo (NPM package), the deepCopy method is vulnerable to Prototype Pollution. Prototype Pollution refers to...
The latest iOS beta suggests that Apple’s next big update will include an iPhone feature that warns users about hidden,...
Expecting a delivery? Watch out for phishing attempts warning of held packages and bogus shipping fees. This Royal Mail delivery...
This week on Lock and Code, we discuss the top security headlines generated right here on Labs. In addition, we...
It's been over a long time since researchers uncovered a couple of security vulnerabilities, known as Spectre and Meltdown, that...
The authorities plan to oblige manufacturers of smartphones and tablets to install domestic search engines by default in the browser....
The severity of cyber-attacks has grown over the past year especially during the global pandemic. Threat actors are looking for...
On the 12th of February, FortiGuard Labs got a solicitation through email from an individual representing an organization called Packity...
One must pay attention to all Twitter advertisements that propagate all kinds of the falsified cryptocurrency scam. Tweeters can "promote"...
A year ago — everything changed. In an effort to stem the tide of a rapidly spreading pandemic, the world...
A tool for checking for lingering free namespaces for private package names referenced in dependency configuration for Python (pypi) requirements.txt,...
DLL Hijack SCanner - A tool to generate leads and automate the discovery of candidates for DLL Search Order HijackingContents...
A security researcher released a new PoC exploit for ProxyLogon issues that could be adapted to install web shells on...
The UK’s National Cyber Security Centre (NCSC) urges UK organizations to install the patches for the recently disclosed vulnerabilities in...
Google has addressed a new zero-day flaw in its Chrome browser that has been actively exploited in the wild, the...
Summary: A flaw was found in ansible-tower. The default installation is vulnerable to Job Isolation escape allowing an attacker to...