Threats

Rackspace Breach Linked to New OWASSRF Vulnerability

Rackspace has acknowledged that it was hit by the Play ransomware a month ago in an attack that compromised customers' Microsoft Exchange accounts. The attackers apparently leveraged a zero-day vulne...

How to Prevent SQL Injection: 5 Key Methods

Most modern websites and applications connect to databases and the databases are programmed using Structured Query Language (SQL). SQL injection (SQLi) vulnerabilities arise when websites do not adequ...

Ransomware Protection: How to Prevent Ransomware Attacks

The best way to prevent ransomware is also the best way to prevent any malware infection - to implement security best practices. Of course, if best practices were easy, no ransomware attacks would o...

Patch Tuesday Fixes Actively Exploited MOTW Vulnerability

Microsoft's December 2022 Patch Tuesday includes fixes for over four dozen vulnerabilities, six of them critical – including a zero-day flaw in the SmartScreen security tool, CVE-2022-44698, that's b...

Researchers Warn of Exploit that Bypasses Web Application Firewalls

Team82 researchers have disclosed an attack technique that bypasses industry-leading web application firewalls (WAFs) by appending JSON syntax to SQL injection payloads. "An attacker able to bypas...

Zero-Day Flaws Found in Several Leading EDR, AV Solutions

SafeBreach Labs researcher Or Yair has uncovered zero-day vulnerabilities in several leading endpoint detection and response (EDR) and antivirus (AV) solutions that enabled him to turn the tools into...

Average Fortune 500 Company Has 476 Critical Vulnerabilities

In a recent analysis of the public and Internet-facing assets of 471 of the Fortune 500 companies, Cyberpion uncovered more than 148,000 critical vulnerabilities (exploits that are publicly available...

HP Wolf Warns of Surge in Malware Hidden in ZIP, RAR Files

Archive files are now the most common file type used to deliver malware – eclipsing Microsoft Office files for the first time – according to HP Wolf Security's Q3 2022 Quarterly Threat Insights Report...

Researchers Find Supply Chain Vulnerability in IBM Cloud

The Wiz Research Team recently discovered a supply chain vulnerability in IBM Cloud that they say is the first to impact a cloud provider's infrastructure. In a dramatic flair, they named the flaw...

Main Targets of Ransomware Attacks & What They Look For

Ransomware has become a potent tool for cybercriminals looking to exploit companies' sensitive data for profit. Ransomware attacks have affected businesses across all sizes, locations, and industries,...

Latest articles