TeamViewer permissions bug
A new vulnerability in TeamViewer remote support software could allow an attacker to gain control of presenter’s or viewer’s session without permission.
TeamViewer permissions bug Read More »
A new vulnerability in TeamViewer remote support software could allow an attacker to gain control of presenter’s or viewer’s session without permission.
TeamViewer permissions bug Read More »
The Federal Bureau of Investigation (FBI) worked with multiple international partners to take down on November 29 one of the longest running malware families dubbed Andromeda.
Andromeda botnet dismantled Read More »
Security researchers spotted an increase in new activity from the Mirai IoT botnet. This new campaign targets organizations in Argentina, but has spread to other parts of South America and North Africa.
New Mirai campaign targets new IoT devices Read More »
In the wake of Apple’s most recent and embarassing blunder regarding the macOS High Sierra root login flaw, I felt it was a good time to revisit Apple Mac hardening guidelines that can help users and IT admins better secure Apple’s OS, to include macOS and OS X.
6 Good Mac Security Hardening Recommendations Read More »
The United Kingdom’s National Cyber Security Centre (NCSC) has released a security advisory and intelligence report on the Turla cyber threat group that targets government, military, technology, energy and commercial organizations.
Turla group malware Read More »
You may have wondered what application containers are, let alone how to secure them. The National Institute of Standards and Technology (NIST) sets out to explain the benefits and security concerns with application container technologies in the latest Special Publication (SP 800-190) Application Container Security Guide.
What Are Application Containers And How Do I Secure Them? Read More »
An OpenEMR vulnerability could expose millions of medical records to attackers. The flaw has been patched with OpenEMR 5.0.0 Patch 6 a couple of weeks ago. Unpatched versions could allow an attacker to steal patient records and personal data by exploiting the vulnerability in the setup.php installation script. OpenEMR is a popular open source electronic health records and medical practice
OpenEMR vulnerability Read More »
The latest version of macOS High Sierra allows any local user with physical access to take over any Mac by logging in as root and no password.
Google security researchers discovered a backdoor family of malware called Tizi that can root Android devices and exploit older vulnerabilities.
Tizi backdoor mobile threat Read More »
The Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) issued a joint technical alert on updated threat intelligence on a remote administration tool (RAT) dubbed FALLCHILL used by the North Korean government.
FALLCHILL RAT cyber threat Read More »