Home 2017-08-28T17:57:09+00:00

“Zerologon” Exploit for Netlogon Remote Protocol

Vulnerability - CVE-2020-1472 Description: An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC), [...]

By | September 15th, 2020|Software Issues|0 Comments

Porn Sites redirecting to Exploit Kits – Malsmoke Group

A cybercrime group named Malsmoke has been targeting porn sites with malicious ads redirecting users to exploit kits. Over the past few months, a hacker group dubbed Malsmoke has been [...]

By | September 14th, 2020|Software Issues, Targeted Attacks|0 Comments

Red Hat CloudForms – 2020:3574 – Security Advisory

Type/Severity Security Advisory: Critical Topic An update is now available for CloudForms Management Engine 5.10. Description A high severity vulnerability was found in all active versions of Red Hat CloudForms [...]

By | September 1st, 2020|Security Update, Software Issues|0 Comments

The new Red Dawn Template – Emotet

Emotet Trojan:- Emotet is a Trojan that is primarily spread through spam emails (malspam). The infection may arrive either via malicious script, macro-enabled document files, or malicious link. Emotet emails may contain familiar branding designed [...]

By | August 30th, 2020|Ransomware, Targeted Attacks, Tips|0 Comments

Security Update – IBM Security Guardium

IBM Security Guardium Insights is affected by an Open Redirect vulnerability Summary IBM Security Guardium Insights has addressed the following vulnerability. Vulnerability Details CVEID:   CVE-2020-4598 DESCRIPTION:   IBM Security Guardium Insights [...]

By | August 27th, 2020|Security Update, Tips|0 Comments