Category: Vulnerabilities | Alerts | Solutions

Vulnerabilities | Alerts | Solutions

Apple Promises Fix for Latest ‘Text Bomb’ Bug As Abuse Spreads | Threatpost

Researchers Find New Twists In ‘Olympic Destroyer’ Malware February 14, 2018 , 2:42 pm U.K. and U.S. Government Websites Among Thousands Infected by Cryptocurrency Miner February 12, 2018 , 12:28 pm Romance Scams Drive Necurs Botnet Activity in Run Up...

/ February 16, 2018

Intel Expands Bug Bounty Program Post-Spectre and Meltdown | Threatpost

Intel Expands Bug Bounty Program Post-Spectre and Meltdown February 15, 2018 , 5:09 pm U.K. and U.S. Government Websites Among Thousands Infected by Cryptocurrency Miner February 12, 2018 , 12:28 pm Romance Scams Drive Necurs Botnet Activity in Run Up...

/ February 15, 2018

Reported Critical Vulnerabilities In Microsoft Software On the Rise | Threatpost

Reported Critical Vulnerabilities In Microsoft Software On the Rise February 15, 2018 , 12:39 pm U.K. and U.S. Government Websites Among Thousands Infected by Cryptocurrency Miner February 12, 2018 , 12:28 pm Two Nasty Outlook Bugs Fixed in Microsoft’s Feb....

/ February 15, 2018

Word-based Malware Attack Doesn’t Use Macros | Threatpost

U.K. and U.S. Government Websites Among Thousands Infected by Cryptocurrency Miner February 12, 2018 , 12:28 pm Two Nasty Outlook Bugs Fixed in Microsoft’s Feb. Patch Tuesday Update February 13, 2018 , 5:01 pm Romance Scams Drive Necurs Botnet Activity...

/ February 15, 2018

Dell EMC Patches Critical Flaws in VMAX Enterprise Storage Systems | Threatpost

Researchers Find New Twists In ‘Olympic Destroyer’ Malware February 14, 2018 , 2:42 pm Hotspot Shield Vulnerability Could Reveal ‘Juicy’ Info About Users, Researcher Claims February 7, 2018 , 1:00 pm Apple Downplays Impact of iBoot Source Code Leak February...

/ February 14, 2018

Researchers Find New Twists In ‘Olympic Destroyer’ Malware | Threatpost

Hotspot Shield Vulnerability Could Reveal ‘Juicy’ Info About Users, Researcher Claims February 7, 2018 , 1:00 pm Apple Downplays Impact of iBoot Source Code Leak February 8, 2018 , 5:26 pm Insurance Customers’ Personal Data Exposed Due to Misconfigured NAS...

/ February 14, 2018

Two Nasty Outlook Bugs Fixed in Microsoft’s Feb. Patch Tuesday Update | Threatpost

Two Nasty Outlook Bugs Fixed in Microsoft’s Feb. Patch Tuesday Update February 13, 2018 , 5:01 pm Venerable Unicode Technique Used to Deliver Cryptomining Malware Through Telegram February 13, 2018 , 2:36 pm Hotspot Shield Vulnerability Could Reveal ‘Juicy’ Info...

/ February 13, 2018

Venerable Unicode Technique Used to Deliver Cryptomining Malware Through Telegram | Threatpost

Venerable Unicode Technique Used to Deliver Cryptomining Malware Through Telegram February 13, 2018 , 2:36 pm Hotspot Shield Vulnerability Could Reveal ‘Juicy’ Info About Users, Researcher Claims February 7, 2018 , 1:00 pm Apple Downplays Impact of iBoot Source Code...

/ February 13, 2018

‘Olympic Destroyer’ Malware Behind Winter Olympics Cyberattack, Researchers Say | Threatpost

Hotspot Shield Vulnerability Could Reveal ‘Juicy’ Info About Users, Researcher Claims February 7, 2018 , 1:00 pm Apple Downplays Impact of iBoot Source Code Leak February 8, 2018 , 5:26 pm Insurance Customers’ Personal Data Exposed Due to Misconfigured NAS...

/ February 12, 2018

Romance Scams Drive Necurs Botnet Activity in Run Up to Valentine’s Day | Threatpost

U.K. and U.S. Government Websites Among Thousands Infected by Cryptocurrency Miner February 12, 2018 , 12:28 pm Hotspot Shield Vulnerability Could Reveal ‘Juicy’ Info About Users, Researcher Claims February 7, 2018 , 1:00 pm Apple Downplays Impact of iBoot Source...

/ February 12, 2018