Blog

Vulnerability Notes

Multiple vulnerabilities found in the Cobham EXPLORER 710 satcom terminal

Overview CERT/CC researchers examined the satcom terminal Cobham EXPLORER 710 as an expansion of work from IOActive’s findings in 2014. They discovered...
Read More
Vulnerability Notes

iTerm2 with tmux integration is vulnerable to remote command execution

Overview iTerm2, up to and including version 3.3.5, with tmux integration is vulnerable to remote command execution. Description iTerm2 is...
Read More
Vulnerability Notes

Pulse Secure VPN contains multiple vulnerabilities

Overview Pulse Secure SSL VPN contains multiple vulnerabilities that can allow remote unauthenticated remote attacker to compromise the VPN server...
Read More
Vulnerability Notes

Multiple D-Link routers vulnerable to remote command execution

Overview Multiple D-Link routers are vulnerable to unauthenticated remote command execution. Description Several D-Link routers contain CGI capability that is exposed to...
Read More
Vulnerability Notes

Microsoft Office for Mac cannot properly disable XLM macros

Overview The Microsoft Office for Mac option "Disable all macros without notification" enables XLM macros without prompting, which can allow...
Read More
Virus Alerts

PUA.SafelyOnline

Updated: August 02, 2019 6:02:00 AM Type: Potentially Unwanted App Infection Length: Varies Name: Safely Version: 1.0.1 Publisher: Unknown Risk Impact: Low Systems Affected: Windows Behavior PUA.SafelyOnline is...
Read More
Virus Alerts

Adware.4SharedDesktop

Updated: July 29, 2019 7:40:16 AM Type: Adware Infection Length: Varies Name: 4Shared Desktop Version: 4.0.2.6 Publisher: New IT Limited Risk Impact: High Systems Affected: Windows Behavior Adware.4SharedDesktop...
Read More
Virus Alerts

Backdoor.Wellmess

Discovered: November 04, 2019 Updated: November 04, 2019 4:41:36 PM Infection Length: Varies Systems Affected: Windows Backdoor.Wellmess is a Trojan horse that opens a...
Read More
Virus Alerts

Backdoor.Lookback

Discovered: November 03, 2019 Updated: November 04, 2019 4:33:49 PM Type: Trojan Infection Length: Varies Systems Affected: Windows Backdoor.Lookback is a Trojan horse that opens...
Read More
Virus Alerts

Ransom.Buran

Discovered: October 23, 2019 Updated: October 30, 2019 8:41:01 AM Type: Trojan Infection Length: Varies Systems Affected: Windows Ransom.Buran is a Trojan horse that encrypts...
Read More
Virus Alerts

SONAR.Windivert!g1

Discovered: October 22, 2019 Updated: October 24, 2019 8:39:20 AM Type: Trojan, Virus Infection Length: Varies Systems Affected: Windows SONAR.Windivert!g1 is a heuristic detection designed...
Read More
Virus Alerts

Heur.Malcode!gen4

Discovered: October 22, 2019 Updated: October 24, 2019 10:32:55 AM Type: Trojan Systems Affected: Windows Heur.Malcode!gen4 is a heuristic detection for threats typically used...
Read More
18 Healthcare cyber-security incidents in October
Blogs Incident Reporting

18 Healthcare cyber-security incidents in October

Numerous privacy incidents at hospitals, IT suppliers and other healthcare organizations captured public attention last month. While some security incidents...
Read More
5 reasons why India desires cybersecurity education
Blogs

5 reasons why India desires cybersecurity education

Unprecedented growth in technology has blurred boundaries by reworking the approach we tend to work and the way governments serve...
Read More
How to accurately live your company’s cybersecurity
Blogs

How to accurately live your company’s cybersecurity

With information breaches and different varieties of cyberattacks turning into an everyday prevalence, companies of all sizes reside in concern...
Read More
It’s Time Bharat Govt. Gets Proactive with Cyber Security
Blogs

It’s Time Bharat Govt. Gets Proactive with Cyber Security

As October was winding down, the media in Bharat went berserk with reports of a cyber-attack at the Kudankulam atomic...
Read More
Is India cyber security ready?
Blogs

Is India cyber security ready?

The recent breach at the Kudankulam atomic energy plant and therefore the approach it absolutely was handled leave heaps to...
Read More
HOW TO ENSURE DATA SECURITY IN ORGANIZATIONS?
Blogs

HOW TO ENSURE DATA SECURITY IN ORGANIZATIONS?

The cybersecurity world is progressing at high speed. At constant time, innovation in technologies is changing into progressively higher to...
Read More
How To place along a good and effective info Security Policy
Blogs

How To place along a good and effective info Security Policy

As a business operational in any sort of business, the safety of your information and on-line activity are going to...
Read More
Future of Work: investing intelligent info security, empowering staff is essential
Blogs

Future of Work: investing intelligent info security, empowering staff is essential

The conventional read of the work is witnessing a big transformation. The ever-changing expectations of the new generation of employees...
Read More
1 2 3 19