Email:

Phone No.

Whatsapp

Blog

New Microsoft Office zero-day Used in Attacks to Execute PowerShell
New Microsoft Office zero-day Used in Attacks to Execute PowerShell
New Microsoft Office zero-day Used in Attacks to Execute PowerShell
New Microsoft Office zero-day Used in Attacks to Execute PowerShell

New Microsoft Office zero-day Used in Attacks to Execute PowerShell

New Microsoft Office zero-day Used in Attacks to Execute PowerShell Security researchers have discovered a new Microsoft Office zero-day vulnerability that is being used in attacks to execute malicious PowerShell commands via Microsoft Diagnostic Tool (MSDT) simply by opening a Word document. The vulnerability, which has yet to receive a tracking number and is referred

Spoof email meaning: What your organisation should know

Spoof Email Meaning Email spoofing is a tactic employed in spam and phishing campaigns to deceive consumers into believing a communication originated from a person or organization they know or can trust. In spoofing attacks, the sender falsifies email headers such that client software shows the fake sender address, which the majority of users accept

Microsoft: The New Windows 11 Features from Build 2022

Microsoft: The New Windows 11 Features from Build 2022 During the Build 2022 developer conference, Microsoft announced a number of new features for Windows 11, including an improved Windows Subsystem for Android (WSA) and more. Microsoft is upgrading the Android OS within the subsystem to Android 12L and adding support for advanced networking, so your

Microsoft Finds Severe Bugs in Android Apps from Large Mobile Providers

Microsoft Finds Severe Bugs in Android Apps from Large Mobile Providers Microsoft security researchers have found high severity vulnerabilities in a framework used by Android apps from multiple large international mobile service providers. The researchers found these vulnerabilities (tracked as CVE-2021-42598, CVE-2021-42599, CVE-2021-42600, and CVE-2021-42601) in a mobile framework owned by mce Systems exposing users to command injection and privilege escalation

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
× Chat with us