vulnerabilities

Chinese Buckeye Group Behind Two Zero-Day Attacks?

Buckeye group, the alleged hacking team composed of Chinese nationals were implicated by Symantec as the one behind the massive exploitation of a zero-day Windows critical security vulnerability which was only patched by Redmond last March 2019. In fact, Symantec claims that this alleged Chinese hacking team got a hold of the same Equation Group

[ Read More ]

jQuery JavaScript Library, Target Of Pollution Attacks

We can safely say that the Internet and the World Wide Web today will not be possible without the use of a scripting language that most people often overlook, Javascript. Whether we like it or not, JavaScript made the web as interactive, usable and convenient to use, in fact disabling scripting will break the functionality

[ Read More ]

VPN Apps Not Working As Intended, Exposed

As an IT professional for decades, we are always highlighting the importance of VPN when it comes to maintaining security and privacy. It is the most cost-effective way to isolate a connection from prying eyes, a VPN creates a secure virtual pipe from the user’s origin device to the VPN vendor’s exit node, wherever it

[ Read More ]

Legacy Systems And Cybersecurity, A Difficult Reality

Maintenance and continued use of legacy systems by many corporate entities today make the goal of cybersecurity for the world today a tall order. As organizations are transitioning to new systems, the old systems remain running in order to maintain their clients under their current business model. Of course, the reliability of the old system

[ Read More ]

Design Website Houzz Caught In Data Breach

Home improvement and design website Houzz has publicly disclosed that an unauthorized third party had obtained a file containing user data. This looks like the data breach was discovered late last year. According to a report in scmagazine, the FAQ page published on Houzz.com today says that the compromised information falls under three categories: •

[ Read More ]

The Importance of Security in Mergers & Acquisitions

Mergers and Acquisitions- big things happening in the world of business. M&As have yielded wonderful results and have even resulted in the genesis of some of the most successful of business firms. Well, let’s look at another aspect of the M&A process. Typically seen as a mere boardroom thing, there are other aspects of M&A

[ Read More ]

Is Your Router Being Exploited By Cyber Attackers?

Chances are you have a wifi router in your home that broadcasts an internet signal so your devices, laptops, smartphones, tablets, video game consoles, and whatever else can use it. If you work in an office, chances are you have a router there too. And if you go to your local coffee shop to surf

[ Read More ]

Is The Department Of Labor Exposing Your Employee Benefits To Attack?

In the U.S. and Canada, the first Monday of September is dedicated to Labor Day, a public holiday established to honor the social and economic achievements of hard working Americans throughout history. According to the U.S. Department of Labor (DOL), the event recognizes how the average employee has directly contributed to the current strength and prosperity

[ Read More ]

These Software Vulnerabilities Have Pentesters On Edge

A new study by cybersecurity firm Rapid 7, recently revealed that their penetration testers have successfully exploited at least one software vulnerability used by about 84% of all the companies included in the study. The test was done in early September 2017 through mid-June 2018 and involved a total number 268 companies. A software vulnerability is any

[ Read More ]

Don’t Forget These 4 Tips To Stop A Ransomware Infection In Its Tracks

Fourteen months after WannaCry has been introduced to the world, we continue to hear new stories of companies falling for its derivatives and seems like there is no end to the scourge. One way or another firms realize that the installation of an antivirus software is no longer sufficient. Employees make or break the corporate

[ Read More ]