Email:

Phone No.

Whatsapp

Blog

DNSpooq Bugs Let Attackers Hijack DNS On Millions Of Devices
DNSpooq Bugs Let Attackers Hijack DNS On Millions Of Devices
DNSpooq Bugs Let Attackers Hijack DNS On Millions Of Devices
DNSpooq Bugs Let Attackers Hijack DNS On Millions Of Devices

DNSpooq Bugs Let Attackers Hijack DNS On Millions Of Devices

DNSpooq Bugs Let Attackers Hijack DNS On Millions Of Devices Israel-based security consultancy firm JSOF disclosed today seven Dnsmasq vulnerabilities, collectively known as DNSpooq, that can be exploited to launch DNS cache poisoning, remote code execution, and denial-of-service attacks against millions of affected devices. Dnsmasq is a popular and open-source Domain Name System (DNS) forwarding software that adds DNS caching and

FreakOut Malware Exploits Critical Bugs To Infect Linux Hosts

FreakOut Malware Exploits Critical Bugs To Infect Linux Hosts An active malicious campaign is currently targeting Linux devices running software with critical vulnerabilities that is powering network-attached storage (NAS) devices or for developing web applications and portals. The purpose is to infect machines with vulnerable versions of the popular TerraMaster operating system, the Zend Framework

IObit Forums Hacked In Widespread DeroHE Ransomware Attack

IObit Forums Hacked In Widespread DeroHE Ransomware Attack Windows utility developer IObit was hacked over the weekend to perform a widespread attack to distribute the strange DeroHE ransomware to its forum members. IObit is a software developer known for Windows system optimization and anti-malware programs, such as Advanced SystemCare. Over the weekend, IObit forum members

Microsoft Defender To Enable Full Auto-Remediation By Default

Microsoft Defender To Enable Full Auto-Remediation By Default Microsoft will enable fully automated threat remediation by default for Microsoft Defender for Endpoint customers who have opted into public previews starting next month, on February 16, 2021. This change of the default automation level from Semi to Full comes after finding that organizations using full automation by

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
× Chat with us