Security News

D-Link Home Routers Open to Remote Takeover Will Remain Unpatched
2019-10-07 18:16

CVE-2019-16920 allows remote unauthenticated attackers to execute code on a target device.

Spear Phishing Update: Email Account Takeover Risks
2019-09-23 17:03

Barracuda is out with its latest Spear Phishing Update, and among the key findings: a rise in email account takeover and lateral phishing. Why are enterprise defenses failing to detect these...

TSYS Authentication Platform helps companies fight synthetic and account takeover fraud
2019-09-16 02:30

TSYS announced a new authentication product that provides unprecedented real-time verification of customer identities. The new offering, the TSYS Authentication Platform, relies on customer...

Critical Exim Flaw Opens Millions of Servers to Takeover
2019-09-09 14:01

A critical vulnerability found in Exim servers could enable a remote, unauthenticated attacker to execute arbitrary code with root privileges.

The Costs and Risks of Account Takeover
2019-09-06 16:03

What Can be Done About ATO Attacks?Account takeover (ATO) attacks result in billions of dollars of fraud and damage to brand reputation each year. These are the costs and risks associated with ATO.

How to prevent a Corporate Account Takeover
2019-09-04 14:10

Corporate accounts are the crown jewels to hackers. Learn how to stop hackers from business identity theft.

BMC vulnerabilities in Supermicro servers allow remote takeover, data exfiltration attacks
2019-09-03 11:10

A slew of vulnerabilities affecting the baseboard management controllers (BMCs) of Supermicro servers could be exploited by remote attackers to gain access to corporate networks, Eclypsium...

Critical Cisco VM Bug Allows Remote Takeover of Routers
2019-08-29 14:06

CVE-2019-12643 has been given the highest possible severity rating.

Cisco UCS Vulnerabilities Allow Complete Takeover of Affected Systems
2019-08-28 16:28

A researcher has disclosed the details and created Metasploit modules for Cisco UCS vulnerabilities that can be exploited to take complete control of affected systems. read more