Email:

Phone No.

Whatsapp

Month: June 2021

Cisco ASA Vulnerability Actively Exploited After Exploit Released
Cisco ASA Vulnerability Actively Exploited After Exploit Released
Cisco ASA Vulnerability Actively Exploited After Exploit Released
Cisco ASA Vulnerability Actively Exploited After Exploit Released

Cisco ASA Vulnerability Actively Exploited After Exploit Released

Cisco ASA Vulnerability Actively Exploited After Exploit Released Hackers are scanning for and actively exploiting a vulnerability in Cisco ASA devices after a PoC exploit was published on Twitter. This Cisco ASA vulnerability is cross-site scripting (XSS) vulnerability that is tracked as CVE-2020-3580. Cisco first disclosed the vulnerability and issued a fix in October 2020. However, the initial

WhyNotWin11 is a Better Replacement for Windows 11’s PC Health Check

WhyNotWin11 is a Better Replacement for Windows 11’s PC Health Check An open-source application called WhyNotWin11 acts as a better drop-in replacement for Microsoft’s PC Health Check app to determine if your hardware is compatible with Windows 11. This week, Microsoft announced that the next version of Windows is Windows 11 would be the next version of

Nobelium Hackers Accessed Microsoft Customer Support Tools

Nobelium Hackers Accessed Microsoft Customer Support Tools Microsoft says they have discovered new attacks conducted by the Russian state-sponsored Nobelium hacking group, including a hacked Microsoft support agent’s computer that exposed customer’s subscription information. Nobelium is Microsoft’s name for a state-sponsored hacking group believed to be operating out of Russia responsible for the SolarWinds supply-chain attacks. 

Microsoft Admits to Signing Rootkit Malware in Supply-chain Fiasco

Microsoft Admits to Signing Rootkit Malware in Supply-chain Fiasco Microsoft has now confirmed signing a malicious driver being distributed within gaming environments. This driver, called “Netfilter,” is in fact a rootkit that was observed communicating with Chinese command-and-control (C2) IPs. G Data malware analyst Karsten Hahn first took notice of this event last week and was joined by the

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
× Chat with us