Log in to see all content. Some content is hidden to the public.
Can't find what you're looking for? Help us improve the search functionality by reporting the expected results.
3050 Results
May 2023: Phishing Attacks Impersonate Secure Share Providers
Threat Alert: What to Watch For Attackers have launched a series of phishing attacks impersonating reputable secure share providers, which are used for securely sharing files. The lures contain links or attachments containing the supposed document. Interacting with the link or attachment leads to the installation of credential harvesting malicious software (malwa
Vulnerabilities in Multiple Apple Products
Apple has released security updates to address vulnerabilities in multiple Apple products. For a complete description of the vulnerabilities and affected systems go to Apple Security Updates. IT Security Read more about IT Security service offerings.
Vulnerability in KeePass
There is a vulnerability in the open-source password manager KeePass. An attacker could exploit this vulnerability to retrieve the master password from the software’s memory. For a complete description of the vulnerabilities and affected systems go to CVE-2023-32784 Detail. IT Security
Vulnerabilities in Chrome
Google released Chrome 113.0.5672.126 for Mac and Linux and 113.0.5672.126/.127 for Windows to address vulnerabilities in Chrome. For a complete description of the vulnerabilities and affected systems go to Chrome Stable Channel Update. IT Security
Critical Vulnerabilities in Cisco Small Business Series Switches
Cisco has released security updates to address Critical vulnerabilities in Cisco Small Business Series Switches. These vulnerabilities could be exploited to allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or execute arbitrary code with root privileges on an affected device.
High Vulnerability in Microsoft Windows Server 2022 MSHTML Platform
Microsoft released a high security update to address a vulnerability in Microsoft Windows Server 2022 MSHTML Platform. A malicious actor could exploit this vulnerability to disclose Net-NTLMv2 hashes. Proof-of-concept (PoC) information is publicly available.
High Actively Exploited Vulnerability in WordPress Plugin
WordPress released a security update to address a High Actively Exploited vulnerability in Elementor Essential Addons for Elementor Plugin. Exploitation of this vulnerability could allow a remote, unauthenticated attacker to modify passwords for known usernames and escalate privileges. A proof-of concept (PoC) code is publicly available and exploitation of this vulnerability has been reported in the wild.
Vulnerabilities in Multiple Microsoft Products
Microsoft released their May Security Update to address vulnerabilities in multiple Microsoft products. An attacker can exploit some of these vulnerabilities to take control of an affected system. For a complete description of the vulnerabilities and affected systems go to May 2023 Security Update Guide. IT Security
Critical and Important Vulnerabilities in Adobe Substance 3D Painter
Adobe has released security updates to address Critical and Important vulnerabilities in Adobe Substance 3D Painter. An attacker could exploit these vulnerabilities to take control of an affected system.
IT Website Content: Search Improvements
- Staff
- Technical Partner