Security firm F5 has disclosed a critical vulnerability in its BIG-IP product, a family of hardware and software solutions that are used for application delivery and centralised device management.
COMPANY NEWS: Sophos, a global leader in next-generation cybersecurity, today released details of a novel exploit that bypasses a patch for a critical vulnerability (CVE-2021-40444) affecting the Microsoft Office file format. The findings are reported in a new SophosLabs Uncut article, “Attackers test ‘CAB-less 40444’ exploit in a dry run,” that shows how the attackers took a publicly available proof-of-concept Office exploit and weaponised it to deliver Formbook malware. The attackers then distributed it through spam emails for approximately 36 hours before it disappeared, according to Sophos researchers.
A serious vulnerability in the Log4j Java-based logging library is affecting many enterprise applications and cloud services.
Cybersecurity risks in the retail industry suggests that the 2021 holiday shopping season will be further disrupted by cybercriminals looking to create chaos and take advantage of an unprecedented global supply chain crisis, according to one security firm.
A widely deployed SSL VPN device known as Pulse Secure Connect has been revealed to have a serious vulnerability, with a Common Vulnerability Scoring System score of 10, the maximum possible, that can be exploited remotely.
Three remotely exploitable vulnerabilities in Microsoft's NT Lan Manager, a proprietary authentication protocol, have been patched by the company in its updates for June, after they were detailed by Israeli security outfit Preempt.
Networking vendor Cisco has released patches to fix a flaw in its Adaptive Security Appliance software that can be remotely exploited.
What about all the customers they turned away and refused to fix their phones due to 'water damage'. I had[…]
....and Australia is no where to been seen...
Exactly. And the source document makes it clear that Assange is being pursued for his alleged involvement in the hacking,[…]
You can believe whatever you want. The source document is there for people to see the facts.
But Sam, you’ve just proved my point. The indictment “stems from” the publication of the material but it includes a[…]