Cybersecurity Threats | Remote Code Execution | SAP Vulnerabilities Interconnected SAP exploits allow remote code execution
Cisco Products | Mitigation Strategies | Security Vulnerability Cisco Secure Firewall vulnerability enables remote shell command injections
Authentication Vulnerabilities | Cybersecurity Threats | Phishing Techniques Hackers using specialized phishing tools for downgrade attacks on FIDO authentication
Remote Procedure Call Security | Spoofing Attacks | Vulnerability Disclosure Researchers have outlined a Windows EPM poisoning exploit sequence that can result in escalated privileges within a domain.
Cybersecurity Mitigations | Exchange Server | Security Vulnerability Microsoft has revealed a vulnerability in Exchange Server that allows for discreet access to cloud services in hybrid configurations.
Cybersecurity A new undetectable malware strain is targeting Linux servers to establish lasting SSH access.
Cybersecurity A new backdoor called ‘Plague’ has emerged that compromises critical Linux systems, allowing for covert theft of credentials.