by bct2mastertemp | Jun 29, 2022 | Blog
Recently, Microsoft reported high severity security vulnerabilities in multiple apps offered by large international mobile service providers. What makes this especially noteworthy is the fact that these vulnerabilities aren’t app specific, but framework...
by bct2mastertemp | Jun 28, 2022 | Blog
Do you maintain a MySQL server? If so, you’re certainly not alone. What you may not know is that according to research conducted by The Shadowserver Foundation, (a cybersecurity research group) there are literally millions of MySQL servers visible on the...
by bct2mastertemp | Jun 27, 2022 | Blog
Are you a WhatsApp user? If so, be aware that hackers have worked out a means of hijacking a user’s WhatsApp account and gaining access to a user’s contact list and personal messages. The attack relies on mobile carriers’ automated service to...
by bct2mastertemp | Jun 25, 2022 | Blog
Teams was “just another Microsoft application” before the pandemic. Thanks to Covid-19 though, demand for video conferencing solutions shot through the roof, and suddenly Teams found its groove. Microsoft had been gamely trying to bolster its popularity...
by bct2mastertemp | Jun 24, 2022 | Blog
Not long ago, researchers at Eclypsium got a lucky break. An unknown and unidentified individual began leaking communications from inside the Conti ransomware organization. These leaked communications seemed to confirm what has long been suspected: That there are...
by bct2mastertemp | Jun 23, 2022 | Blog
File this away under “good news, bad news.” The bad news is that there’s a new, critical zero-day threat to be concerned about. The threat has been dubbed ‘Follina.’ It is being tracked as CVE-2022-30190 and is being described by...