Vulnerability & Threat Management

6 02, 2019

Threadkit, Formbook Exploit Old Microsoft Vulnerability

By | February 6th, 2019|Threat Intelligence|Comments Off on Threadkit, Formbook Exploit Old Microsoft Vulnerability on Threadkit, Formbook Exploit Old Microsoft Vulnerability

A Microsoft Office vulnerability first discovered in July 2017 has been exploited by Formbook malware
1 02, 2019

New FaceTime Bug Allows Audio, Video Eavesdropping

By | February 1st, 2019|Threat Intelligence|Comments Off on New FaceTime Bug Allows Audio, Video Eavesdropping on New FaceTime Bug Allows Audio, Video Eavesdropping

The FaceTime Bug allowing unauthorized microphone and camera access is the latest chapter in Apple’s information disclosure story
30 01, 2019

Kuwait Oil Company Spreadsheet Delivering OmniRAT to OT Networks

By | January 30th, 2019|Threat Intelligence|Comments Off on Kuwait Oil Company Spreadsheet Delivering OmniRAT to OT Networks on Kuwait Oil Company Spreadsheet Delivering OmniRAT to OT Networks

A weaponized Excel file titled “Kuwait Oil Company Business Profile” breathes new life into an old vulnerability, raising concern for unsuspecting OT networks
18 01, 2019

Juniper Vulnerabilities Missed by a Number of Popular Scanners

By | January 18th, 2019|Vulnerability Assessment|Comments Off on Juniper Vulnerabilities Missed by a Number of Popular Scanners on Juniper Vulnerabilities Missed by a Number of Popular Scanners

7 12, 2018

Zero-Day Attack on Russia Prompts OOB Patches

By | December 7th, 2018|Threat Intelligence|Comments Off on Zero-Day Attack on Russia Prompts OOB Patches on Zero-Day Attack on Russia Prompts OOB Patches

A malicious Word document was used to exploit an Abobe Flash Player bug in a targeted zero-day attack on Russia
8 11, 2018

Bleedingbit Vulnerabilities Could Affect Enterprises Worldwide

By | November 8th, 2018|Vulnerability & Threat Management|Comments Off on Bleedingbit Vulnerabilities Could Affect Enterprises Worldwide on Bleedingbit Vulnerabilities Could Affect Enterprises Worldwide

The Bleedingbit vulnerabilities impact Bluetooth low-energy chips used in millions of wireless access points
16 10, 2018

Foreshadow Vulnerabilities Impact Siemens Products

By | October 16th, 2018|Vulnerability & Threat Management|Comments Off on Foreshadow Vulnerabilities Impact Siemens Products on Foreshadow Vulnerabilities Impact Siemens Products

Foreshadow, or L1 terminal fault vulnerabilities, in various Siemens industrial products could put the most isolated and secure microprocessor memory at risk
8 10, 2018

TSMC WannaCry Hits OT Plants with a Hefty Price Tag

By | October 8th, 2018|Vulnerability & Threat Management|Comments Off on TSMC WannaCry Hits OT Plants with a Hefty Price Tag on TSMC WannaCry Hits OT Plants with a Hefty Price Tag

The TSMC WannaCry attack is yet another reminder in the constant vigilance of vulnerability management — and the effect it can have on your bottom line
10 09, 2018

Android API Vulnerability Exposes Sensitive Customer Information

By | September 10th, 2018|Vulnerability & Threat Management|Comments Off on Android API Vulnerability Exposes Sensitive Customer Information on Android API Vulnerability Exposes Sensitive Customer Information

Attackers could use the Android API vulnerability to physically locate a user, track their online activity or target them with ads