0

Microsoft out of band Zero-Day IE Patch – CVE-2019-1367 & CVE-2019-1367

Microsoft released two out of band patches today for critical security vulnerabilities. The first one is for a Zero-Day vulnerability in Internet Explorer. The vulnerability is tracked as [...]

0

Microsoft vulnerabilities exploited in the wild (CVE-2019-1214, CVE-2019-1215)

Microsoft published 80 security fixes in the latest batch of patch updates, released in the September 2019 patch Tuesday. Among those patches are two Zero Day vulnerabilities that have been seen [...]

0

Metasploit releases BlueKeep exploit code (CVE-2019-0708)

BlueKeep is a exploit that was patched back i July 2019. The security flaw, discovered in Windows Remote Desktop Protocol (RDP), enables unauthenticated attackers to run code remotely, to launch [...]

0

Chrome code execution execution – CVE-2019-5869

A vulnerability has been discovered in Google Chrome, which could allow for arbitrary code execution. Google Chrome is a web browser used to access the Internet. Successful exploitation of this [...]

0

Supermicro BMC USBAnywhere Vulnerability

Researchers have identified vulnerabilities in the Virtual Media function of Supermicro BMCs. BMC/IPMI Virtual Media is a feature of the Virtual Console that enables users to attach a CD/DVD [...]

0

Incident Response

0

Endpoint

0

Android Patches 33 New Security Vulnerabilities

Google has started rolling out this month's security updates for its mobile operating system platform to address a total of 33 new security vulnerabilities affecting Android devices, 9 of which [...]

0

Microsoft Office’s Excel Attack Vector

A feature in Microsoft Office’s Excel spreadsheet program called Power Query can be exploited to plant malware on remote systems. Researchers at Mimecast Threat Center say they have developed a [...]

Stored XSS in Microsoft Office SharePoint

The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks. The vulnerability exists due to insufficient sanitization of user-supplied data. A remote [...]

page 1 of 3