Search Results for: security flaws Blog Post Microsoft Reveals Critical Bugs Allowing Takeover of NETGEAR Routers July 21, 2021 Microsoft has revealed critical bugs regarding NETGEAR routers that could cause data leaks and system compromise. More particularly, researchers from... Blog Post Netgear Authentication Bypass Open Up the Possibility of Router Takeover August 17, 2021 Microsoft researchers have disclosed multiple authentication bypass vulnerabilities in Netgear routers. These vulnerabilities open the possibility of total control over... Blog Post Security Flaws In Smart Buildings February 9, 2020 Smart buildings equipped with a large number of networked devices and relying on Internet control are considered easy targets for... Blog Post 50% of Servers Have Weak Security Long After Patches Are Released November 2, 2021 Patch, patch, and patch again. This mantra has been repeated by security experts over and over again as one of... Blog Post Exchange/Outlook Autodiscover Bug Spills 100K+ Email Passwords October 20, 2021 A study conducted by Guardicore security researcher Amit Serper recently demonstrated the potential for large-scale credentials compromise owing to a... Blog Post Microsoft Issued a Warning to Its Azure Customers of a Flaw That Might Allow Hackers to Access Data September 23, 2021 On September 8, 2021, Microsoft issued a warning to its Azure customers) cloud computing customers) of a vulnerability. In essence,... Blog Post Understanding Vulnerability Disclosure and Why It Matters November 29, 2021 When developing any information technology system, software, or hardware, errors and loopholes are nearly unavoidable. These vulnerabilities are often discovered... Blog Post Children’s Connected Toys Could be Hacker’s Target December 20, 2019 Nowadays, it is not surprising to hear that a lot of devices are having vulnerabilities, especially the IoT devices. However,... Blog Post Common ICS Vulnerability Disclosure Framework August 2, 2021 The Cybersecurity and Infrastructure Security Agency’s (CISA) activities aim to promote coherence between government and industry. This capability helps CISA... Blog Post Zero-days in Accellion file transfer app used for data theft March 4, 2021 Back in December 2020, a software vendor Accellion informed about an actively exploited zero-day vulnerability in its File Transfer Appliance... Blog Post How to Secure Windows Remote Desktop Protocol (RDP) in 12 Steps June 10, 2021 As our working environments become increasingly orientated towards remote or hybrid paradigms, so does our reliance on remote technologies such... Blog Post Flaws Found in Google’s Titan Security Key May 17, 2019 Google recalled their Titan hardware security keys this week after discovering serious vulnerabilities. The vulnerability existed due to a misconfiguration... Blog Post Web App Attacks Grew 251% In Two Years January 14, 2022 In general, online threats are increasing in frequency and severity. Businesses, organizations, governmental bodies, and other groups are finding themselves... Blog Post “The Question Is Not IF, But WHEN!” – Interview With Ondrej Krehel, LIFARS’ CEO And Founder: Part 2 October 22, 2020 Ondrej Krehel, CEO & Founder of LIFARS is recognized world-wide for his Digital Forensic expertise and Ethical Hacking. He actively... Blog Post Widespread supply chain vulnerability exposed as security researcher hacks 35 tech giants March 2, 2021 Recently, an enterprising security researcher, Alex Birsan hacked tech companies and managed to pocket over $130,000 in security bounties. Birsan...
Blog Post Microsoft Reveals Critical Bugs Allowing Takeover of NETGEAR Routers July 21, 2021 Microsoft has revealed critical bugs regarding NETGEAR routers that could cause data leaks and system compromise. More particularly, researchers from...
Blog Post Netgear Authentication Bypass Open Up the Possibility of Router Takeover August 17, 2021 Microsoft researchers have disclosed multiple authentication bypass vulnerabilities in Netgear routers. These vulnerabilities open the possibility of total control over...
Blog Post Security Flaws In Smart Buildings February 9, 2020 Smart buildings equipped with a large number of networked devices and relying on Internet control are considered easy targets for...
Blog Post 50% of Servers Have Weak Security Long After Patches Are Released November 2, 2021 Patch, patch, and patch again. This mantra has been repeated by security experts over and over again as one of...
Blog Post Exchange/Outlook Autodiscover Bug Spills 100K+ Email Passwords October 20, 2021 A study conducted by Guardicore security researcher Amit Serper recently demonstrated the potential for large-scale credentials compromise owing to a...
Blog Post Microsoft Issued a Warning to Its Azure Customers of a Flaw That Might Allow Hackers to Access Data September 23, 2021 On September 8, 2021, Microsoft issued a warning to its Azure customers) cloud computing customers) of a vulnerability. In essence,...
Blog Post Understanding Vulnerability Disclosure and Why It Matters November 29, 2021 When developing any information technology system, software, or hardware, errors and loopholes are nearly unavoidable. These vulnerabilities are often discovered...
Blog Post Children’s Connected Toys Could be Hacker’s Target December 20, 2019 Nowadays, it is not surprising to hear that a lot of devices are having vulnerabilities, especially the IoT devices. However,...
Blog Post Common ICS Vulnerability Disclosure Framework August 2, 2021 The Cybersecurity and Infrastructure Security Agency’s (CISA) activities aim to promote coherence between government and industry. This capability helps CISA...
Blog Post Zero-days in Accellion file transfer app used for data theft March 4, 2021 Back in December 2020, a software vendor Accellion informed about an actively exploited zero-day vulnerability in its File Transfer Appliance...
Blog Post How to Secure Windows Remote Desktop Protocol (RDP) in 12 Steps June 10, 2021 As our working environments become increasingly orientated towards remote or hybrid paradigms, so does our reliance on remote technologies such...
Blog Post Flaws Found in Google’s Titan Security Key May 17, 2019 Google recalled their Titan hardware security keys this week after discovering serious vulnerabilities. The vulnerability existed due to a misconfiguration...
Blog Post Web App Attacks Grew 251% In Two Years January 14, 2022 In general, online threats are increasing in frequency and severity. Businesses, organizations, governmental bodies, and other groups are finding themselves...
Blog Post “The Question Is Not IF, But WHEN!” – Interview With Ondrej Krehel, LIFARS’ CEO And Founder: Part 2 October 22, 2020 Ondrej Krehel, CEO & Founder of LIFARS is recognized world-wide for his Digital Forensic expertise and Ethical Hacking. He actively...
Blog Post Widespread supply chain vulnerability exposed as security researcher hacks 35 tech giants March 2, 2021 Recently, an enterprising security researcher, Alex Birsan hacked tech companies and managed to pocket over $130,000 in security bounties. Birsan...