Nine vulnerabilities in Microsoft products were among the top 15 routinely exploited flaws in 2021 listed by government security agencies in the Five Eyes countries.
GUEST RESEARCH: SophosLabs today published a new in-depth article on the SolarMarker malware installer.
Austrian open source software development company grommunio has announced that its groupware, of the same name, can be used to replace Microsoft Exchange.
Threat actors have used exploits for Microsoft Exchange Server to deceive users into opening emails with malicious content, the security firm Trend Micro says.
Two actively exploited zero-day vulnerabilities are among 55 flaws fixed by Microsoft in its monthly Patch Tuesday, with four other zero-days also being remedied.
Microsoft has been urged to reconsider its position on removing exploits from GitHub, the code repository which it acquired in 2018, after an incident in which it removed an exploit for Microsoft Exchange Server from the site.
It was always expected after Microsoft acquired the software code repository GitHub that corporate interests would come first, not the interests of security researchers.
Close on the heels of the DearCry Windows ransomware, that appeared earlier this month and attacked Microsoft Exchange Server flaws, another strain, known as Black Kingdom, has emerged to take advantage of the same vulnerabilities.
Guest Opinion by Daniel Smith, head of research, Radware. Many of us are currently wrapped up in the SolarWinds and ProxyLogon events. But let's take a moment to highlight the risk that residential routers face from the propagation of IoT botnets and the problems devices present once they are infected.
Microsoft has offered users of Exchange Server a means of mitigating the so-called ProxyLogon attack, a one-click tool that it says has been tested across the 2013, 2016 and 2019 versions of Exchange Server.
The proof-of-concept code for the Microsoft Exchange Server vulnerabilities, that was posted on code repository GitHub and removed by the company, has now been re-posted by a number of people other than the original poster.
Most cybersecurity is making up for weak platforms. We need to address the fundamentals, design platforms that prevent out-of-bounds access[…]
For most developers the security/performance trade off is still the hardest one to tackle, even as the cost of processing[…]
RISC has been overhyped. While it is an interesting low-level processor architecture, what the world needs is high-level system architectures,[…]
There are two flaws that are widespread in the industry here. The first is that any platform or language should[…]
Ajai Chowdhry, one of the founders and CEO of HCL is married to a cousin of a cousin of mine.[…]