Malicious WinRAR SFX Files Slipping Past Traditional AV Solutions Post Views: 7 Premium Content Subscribe to Patreon to watch this episode. Reading Time: 3 Minutes Cybersecurity Researchers at CrowdStrike Uncover New Technique for Evading Detection Researchers from...
10-Year-Old Windows vulnerability still being exploited in the 3CX attacks Post Views: 34 Premium Content Subscribe to Patreon to watch this episode. Reading Time: 3 Minutes A 10-year-old Windows vulnerability is still being exploited in attacks A 10-year-old Windows...
Microsoft’s Misconfigured Application Allowed for Real-Time Breach Attempts on Bing.com Post Views: 44 Premium Content Subscribe to Patreon to watch this episode. Reading Time: 3 Minutes BingBang Flaw Microsoft has fixed a security flaw that could have allowed...
Major Companies Hit in Ongoing 3CX VoIP Supply Chain Attack Post Views: 35 Premium Content Subscribe to Patreon to watch this episode. Reading Time: 3 Minutes Compromised 3CX softphone app Hackers are using a trojanized version of the 3CX Voice Over Internet Protocol...
Attackers Could Exploit Flaw in WiFi Protocol to Hijack TCP Connections Post Views: 200 Premium Content Subscribe to Patreon to watch this episode. Reading Time: 3 Minutes Vulnerability in the IEEE 802.11 WiFi protocol standard Cybersecurity researchers have found a...
MacStealer: The new info-stealing malware targeting Mac users Post Views: 9 Premium Content Subscribe to Patreon to watch this episode. Reading Time: 3 Minutes New Mac malware steals credentials and sensitive data Security researchers have discovered a new malware...