Every day, you might use a mobile device to make voice calls, send text messages, post articles on social media platform, and access information on the web. You likely also use a laptop or tablet to communicate, perform work, store work files, video conference, or watch recorded files. Your personal and work data are recorded on these devices moment-by-moment. These files are backed up in local as well as offsite infrastructure. Each new device doesn’t just drive traffic, it also dramatically expands the network attack surface - increasing the opportunity for cybercriminals to leverage sophisticated methods to exploit these opportunities. As a result, we are seeing the rise in cybercrime, and cybersecurity incidents that exploit data found on your devices, on-premises systems, as well as offsite cloud infrastructure.
The online threat landscape is ever-changing. Recently, a functional Microsoft Remote Desktop exploit was publicly released that allows an attacker to gain System access; furthermore, all versions of the popular email delivery software EXIM is reported to be remotely exploitable, enabling an attacker with superuser access to 57% of the worlds email delivery systems.
The Australian Cyber Security Centre (ACSC) has made a new scanning tool programmed to search malicious web shells in designated networks available to Australian government organizations and its partners. These offerings became available shortly...
Hacking cars seems to be so last year with the increasing cyber related incidents on maritime industry. There are no doubts regarding the fact that maritime cyber attacks are still prevalent and are for real.
The revelations made by researcher SandboxEscaper regarding Microsoft 0Day vulnerability did turn out to be a little controversial given the fact that the disclosure was made public through twitter.
We have all seen Microsoft products topping the vulnerability charts back in 2017. This year doesn’t look any different with major vulnerabilities making headlines frequently. A researcher published a Zero-day vulnerability on twitter raising the eyebrows of security experts across the world since the vulnerability was made public before informing Microsoft.