ProxyLogon – Microsoft Exchange Server Critical Security Updates
Last week we have posted information about the recent Microsoft Exchange vulnerability that allowed hackers to gain access to on-prem Microsoft Exchange servers. As the attack - now called ProxyLogon - on Microsoft Exchange Server keeps raging, Microsoft...
Microsoft Exchange Critical Security Updates
(Image source: Wikipedia) On March 2, 2021, Microsoft released a set of out of band security updates for critical vulnerabilities that were discovered in Microsoft Exchange servers and are being used in targeted attacks. The affected versions are Microsoft Exchange...
SIGRed: 17-Year-Old RCE Critical Vulnerability in Windows DNS Server
[Image credit: Check Point Research] A 17-year-old RCE vulnerability in Windows DNS Server was discovered by Check Point Research’s and disclosed today. As Check Point Research describes, “SIGRed (CVE-2020-1350) is a wormable, critical vulnerability (CVSS base score...
Microsoft Defender ATP Is Now Available for Linux (GA) and Android (Preview)
Microsoft recently announced that Microsoft Defender ATP is now available for Linux and Android. Microsoft Defender ATP is generally available for Linux and entered a public preview for Android. Microsoft Defender ATP for Linux supports recent versions of the six most...
Quick Tip: Lingering Object Liquidator v2
The Directory Services team released a new version of the Lingering Object Liquidator for discovery and removal of lingering objects in Active Directory. More information on Lingering Objects can be found in this article. More Information on the Lingering Object...
GhostHook Attack Can Bypass Windows 10 PatchGuard
Image: CYBERARK Threat Research Blog A new discovery from CYBERARK Threat Research team, presents a hooking technique that allows you to control over the way the operating system behaves and enables access to the operating system’s kernel. The researchers note...
Cloudbleed – A Bug in CloudFlare’s HTML Parser Causes Websites Data Leak
(Image source: The Hacker News) A security vulnerability has been discovered in CloudFlare’s HTML parser that leaked website’s sensitive data. This leaked data includes passwords, private messages, API keys, and other sensitive information. The vulnerability was...
AI² – Better Prediction of Cyber-Attacks Using AI and Input from Human Experts
These days, Artificial Intelligence (AI) is used more an more to help humanity with everyday tasks. Although AI is getting smarter and smarter every day, it seems that for better predication of cyber-attacks, a human input can still help significantly. In a new...
Dirty COW Linux Vulnerability
(Image Source: http://dirtycow.ninja) A new Linux vulnerability was found recently, allowing a user with limited access to gain root access to a Linux system. With this vulnerability, called Dirty COW (Dirty Copy-On-Write), an attacker can get write access to...
Exchange Server Turns 20!
If your organization uses email for collaboration, you are probably using Microsoft Exchange. Although the word around is that email is dead, Exchange is still being used widely by organizations small to large. Exchange server was initially used internally at...
Contact Us Today!
Contact us today and find out how our services can empower you and your business!
About Us
Find out more about who we are
Follow Us
Follow us on social media
Recent Comments