Category: Business

  • Blog
  • Category: Business
Cisco IP Phone is vulnerable to attackers’ unauthenticated remote code
Cisco IP Phone is vulnerable to attackers’ unauthenticated remote code
Cisco IP Phone is vulnerable to attackers’ unauthenticated remote code
Cisco IP Phone is vulnerable to attackers’ unauthenticated remote code

Cisco IP Phone is vulnerable to attackers’ unauthenticated remote code

Cisco has discovered a high-severity issue affecting its IP Phone 7800 and 8800 Series, tracked as CVE-2022-20968 (excluding Cisco Wireless IP Phones 8821). An unauthenticated, adjacent attacker might exploit the flaw to cause program flow overruns on a large affected device, which might result in remote code execution (RCE) and denial of service (DoS) attacks.

The new ‘Zombinder’ platform features Android malware with legitimate app 

A darknet platform known as “Zombinder” allows cyber-criminals to compose malicious Android apps that imitate genuine ones, giving victims the opportunity to unintentionally infect themselves. New tracking systems for computing platforms, observed by cybersecurity company ThreatFabric, caught the eye of malware developers. The website impersonates WiFi authorization portals, supposedly enabling users to gain access to

Complications of zero-day vulnerability exploited remotely by Hackers

Researchers from the Google Threat Analysis research organization discovered an incident associated with the APT37 hackers’ group that has been exploiting an official Internet Explorer zero-day vulnerability. Threat actors attempted to exploit the vulnerability using a weaponized document that was used to target the victims from South Korea also this APT37 believed to be a

How the security incident happened at CloudSEK and what we can learn from them

What is incident response? Incident response (sometimes called cybersecurity incident response) is an organization’s systems and procedures for finding and responding to cyberthreats, security breaches, or cyberattacks. The goal of event response is to prevent cybercrime before it happens, and to minimize the cost and business disruption caused by any cybercrime that occurs. An enterprise