Category: Cybersecurity

  • Blog
  • Category: Cybersecurity
LOG4J-A BILLION DEVICE VULNERABILITY
LOG4J-A BILLION DEVICE VULNERABILITY
LOG4J-A BILLION DEVICE VULNERABILITY
LOG4J-A BILLION DEVICE VULNERABILITY

LOG4J-A BILLION DEVICE VULNERABILITY

Could you imagine that something very dangerous has been present in billions of devices since 2013 that can potentially take over more than 3.5 billion devices? That seems like chaos! Right? In Christmas time, on Thursday December 9th The Apache Software Foundation released details on a critical vulnerability in Log4j, a logging library used in

CVE-2022-30190 THE FOLLINA VULNERABILITY

Introduction To Follina (CVE-2022-30190) On May 27th, 2022, Nao_sec discovered a strange Word document uploaded from a Belarusian IP address. Apparently, this was a zero-day vulnerability in Microsoft Office or Windows known as Follina. A malicious Word document can exploit the Follina vulnerability and execute arbitrary code. A vulnerability exploits the built-in URL handlers in

Open Source Security

Modern software projects increasingly rely on open source software, from operating systems to user interface widgets, and from back-end data analysis to front-end graphics. Despite the numerous benefits that open-source software offers, it does come with a number of security risks that must be understood and managed. In general, these risks can be associated with

Flytrap

Thousands of facebook account compromised by Flytrap FlyTrap, a new Android Trojan that has spread to over 10,000 victims through social media hijacking, third-party app stores, and sideloaded applications, has affected at least 140 countries since March 2021. The zLabs team examined the forensic evidence and concluded that this previously undetected malware is part of

Let’s Talk About How Can We Help You Securely Advance

Get A Free Quote
Flytrap
Flytrap