Email:

Phone No.

Whatsapp

Day: March 10, 2021

Adobe Fixes Critical Creative Cloud, Adobe Connect Vulnerabilities
Adobe Fixes Critical Creative Cloud, Adobe Connect Vulnerabilities
Adobe Fixes Critical Creative Cloud, Adobe Connect Vulnerabilities
Adobe Fixes Critical Creative Cloud, Adobe Connect Vulnerabilities

Adobe Fixes Critical Creative Cloud, Adobe Connect Vulnerabilities

Adobe Fixes Critical Creative Cloud, Adobe Connect Vulnerabilities Adobe has released security updates that fix vulnerabilities in Adobe Creative Cloud Desktop, Framemaker, and Connect.  In total, the company fixed eight vulnerabilities today, with the majority of them rated as Critical as they allow arbitrary code execution. Adobe Creative Cloud Desktop has the greatest amount of

z0Miner Botnet Hunts For Unpatched ElasticSearch, Jenkins Servers

z0Miner Botnet Hunts For Unpatched ElasticSearch, Jenkins Servers A cryptomining botnet spotted last year is now targeting and attempting to take control of Jenkins and ElasticSearch servers to mine for Monero (XMR) cryptocurrency. z0Miner is a cryptomining malware strain spotted in November by the Tencent Security Team, who saw it infecting thousands of servers by exploiting

GandCrab Ransomware Affiliate Arrested For Phishing Attacks

GandCrab Ransomware Affiliate Arrested For Phishing Attacks A suspected GandCrab Ransomware member was arrested in South Korea for using phishing emails to infect victims. The GandCrab ransomware operation started in January 2018 when it quickly became a malware empire threatening businesses worldwide. Operated as a Ransomware-as-a-Service (RaaS), the GandCrab developers teamed up with affiliates in a revenue

Security Bug Hunters Focus On Misconfigured Services, Earn Big Rewards

Security Bug Hunters Focus On Misconfigured Services, Earn Big Rewards An overview of the hacking activity on the HackerOne vulnerability coordination and bug bounty platform shows that misconfiguration of cloud resources is quickly becoming a hot target for ethical hackers. This type of weakness is among the top threats in an organization as cybercriminals are

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
× Chat with us