Displaying items by tag: ProxyLogon

GUEST RESEARCH: SophosLabs today published a new in-depth article on the SolarMarker malware installer.

Published in Guest Research

Austrian open source software development company grommunio has announced that its groupware, of the same name, can be used to replace Microsoft Exchange.

Published in Business Software

Threat actors have used exploits for Microsoft Exchange Server to deceive users into opening emails with malicious content, the security firm Trend Micro says.

Published in Security

Two actively exploited zero-day vulnerabilities are among 55 flaws fixed by Microsoft in its monthly Patch Tuesday, with four other zero-days also being remedied.

Published in Security

Microsoft has been urged to reconsider its position on removing exploits from GitHub, the code repository which it acquired in 2018, after an incident in which it removed an exploit for Microsoft Exchange Server from the site.

Published in Security

It was always expected after Microsoft acquired the software code repository GitHub that corporate interests would come first, not the interests of security researchers.

Published in Open Sauce

Close on the heels of the DearCry Windows ransomware, that appeared earlier this month and attacked Microsoft Exchange Server flaws, another strain, known as Black Kingdom, has emerged to take advantage of the same vulnerabilities.

Published in Security

Guest Opinion by Daniel Smith, head of research, Radware. Many of us are currently wrapped up in the SolarWinds and ProxyLogon events. But let's take a moment to highlight the risk that residential routers face from the propagation of IoT botnets and the problems devices present once they are infected.

Published in Guest Opinion

Microsoft has offered users of Exchange Server a means of mitigating the so-called ProxyLogon attack, a one-click tool that it says has been tested across the 2013, 2016 and 2019 versions of Exchange Server.

Published in Security

The proof-of-concept code for the Microsoft Exchange Server vulnerabilities, that was posted on code repository GitHub and removed by the company, has now been re-posted by a number of people other than the original poster.

Published in Security

Subscribe to Newsletter

*  Enter the security code shown: img0

CYBERSECURITY

PEOPLE MOVES

GUEST ARTICLES

Guest Opinion

ITWIRETV & INTERVIEWS

RESEARCH & CASE STUDIES

Channel News

Comments