Vulnerability

Penetration Testing Tool Yuki-Chan for Threat Protection

We are recommending for quite a while for companies serious with their IT security to subject itself to a thorough penetration testing. Pen test can be done internally by knowledgeable IT staff, or the company can hire an external pen testing team. Members of pen test teams are passionable when it comes to detecting weaknesses

[ Read More ]

SandCat And FruityArmor Campaigns Took Advantage Of Zero-Day Flow

Critical vulnerability under CVE-2019-0797 has been recently patched by Microsoft in order to lessen the chances of two Advanced Persistent Threat groups, SandCat, and FruityArmor from taking advantage of it. The former zero-day exploit was being exploited by the two groups extensively, with many of their victims unaware of it. This is given since only

[ Read More ]

Winning Backup Formula: Mixed Traditional And Cloud Storage

IT security experts have been reminding everyone to “backup, backup, backup” for decades now, in fact since the introduction of peripheral storage devices such as the DVDs and USB flash drives. Backup systems are not products of rocket science, in fact, tape drives have been in the market since at least the 1960s. The high

[ Read More ]

SHAREit App’s Vulnerability, Publicly Disclosed

It is very important security-wise that app updates be applied as soon as they become available, regardless of platform. Recently a critical vulnerability has been discovered in the popular cross-platform app, SHAREit. With a global user-base of around 1.5 billion users, and versions for MacOS, Windows, iOS, and Android, a flaw in the app affects

[ Read More ]

19-Year-Old WinRAR Bug That Lets Install Malware in Computers

A 19-year-old security flaw, which lets hackers install malware in systems, has been detected in WinRAR, the popular Windows file archival tool. WinRAR, which has been popular as a powerful archive manager for over two decades now, is used for backing up data, compressing files and thus reducing the size of email attachments, decompressing files

[ Read More ]

Data Leak Exposes Mass Surveillance in Xinjiang, China

A data leak has brought to light widespread surveillance that has been happening in the Xinjiang region of China. A data leak that has been discovered by a Dutch security researcher has brought to light the surveillance carried out by a Chinese technology firm in the Xinjiang region, which is home to the majority of

[ Read More ]

Google Patches Critical .PNG Security Vulnerability

Good news for Android users. Google has fixed a critical vulnerability that affected Android devices. This bug helps cybercriminals hack Android devices by sending specially crafted PNG (Portable Network Graphics) image files and using the same to execute arbitrary codes. Threatpost reports, “Google has patched a critical vulnerability in its current and legacy versions of

[ Read More ]

Here Is A Surprising Look At Smart City-Based Vulnerabilities

Not only has the 21st century introduced a whole new way thinking about the world, it has forced people living in big cities to change their collective mindset. The rise of “smart cities,” complete with their various types of electronic data collection sensors and information-gathering resources, has dramatically altered the attack vector on the people

[ Read More ]

How The 2019 WannaCry Scam Evolved Into Straight Up Extortion

May 12, 2017, will always be remembered by the corporate world, especially the healthcare industry as a date when a new cyber-extortion racket, the WannaCry malware was unleashed and no cybersecurity software was able to anticipate it. It took advantage of a flaw in Server Message Blocks (SMB) version 1.0 to penetrate an otherwise security-hardened

[ Read More ]