Email:

Phone No.

Whatsapp

Month: December 2021

Garrett Walk-through Metal Detectors can be Remotely Manipulated
Garrett Walk-through Metal Detectors can be Remotely Manipulated
Garrett Walk-through Metal Detectors can be Remotely Manipulated
Garrett Walk-through Metal Detectors can be Remotely Manipulated

Garrett Walk-through Metal Detectors can be Remotely Manipulated

Garrett Walk-through Metal Detectors can be Remotely Manipulated Two widely used walk-through metal detectors made by Garrett are vulnerable to many remotely exploitable flaws that could severely impair their functionality, thus rendering security checkpoints deficient. Garrett is a well-known US-based manufacturer of hand-held and walk-through metal detectors commonly deployed in security-critical environments such as sports

Windows 10 21H2 Adds Ransomware Protection to Security Baseline

Windows 10 21H2 Adds Ransomware Protection to Security Baseline Microsoft has released the final version of security configuration baseline settings for Windows 10, version 21H2, available today from the Microsoft Security Compliance Toolkit. “This Windows 10 feature update brings very few new policy settings,” Microsoft security consultant Rick Munck said. “One setting has been added

Microsoft Warns of Easy Windows Domain Takeover via Active Directory Bugs

Microsoft Warns of Easy Windows Domain Takeover via Active Directory Bugs Microsoft warned customers today to patch two Active Directory domain service privilege escalation security flaws that, when combined, allow attackers to easily takeover Windows domains. The company released security updates to address the two security vulnerabilities (tracked as CVE-2021-42287 and CVE-2021-42278 and reported by Andrew Bartlett of Catalyst

Meta Sues People Behind Facebook and Instagram Phishing

Meta Sues People Behind Facebook and Instagram Phishing Meta (formerly known as Facebook) has filed a federal lawsuit in California court to disrupt phishing attacks targeting Facebook, Messenger, Instagram, and WhatsApp users. The attackers behind these phishing campaigns used almost 40,000 phishing pages that would impersonate the four platforms’ login pages. “This phishing scheme involved the creation

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
× Chat with us