CyberWatch

Cisco, VMWare, Microsoft, Amazon, Google, Citrix, Tegile, ESET, Meraki, Brocade, Intel, LabTech, Network Center, 3CX, Adobe, Linux, Nutanix, Symantec, TrendMicro

  • Intel CPU Vulnerability Puts Personal Information at Risk

    Intel CPU Vulnerability Puts Personal Information at Risk

    Recently a few vulnerabilities were discovered in Intel based chipsets that have been installed in all intel based hardware over the last 10 years. These vulnerabilities have been named...

    Read Article
  • Wireless Vulnerability: KRACK WPA2

    Wireless Vulnerability: KRACK WPA2

    Recently a vulnerability was discovered in the authentication process of WPA2 wireless connections. This vulnerability is primarily affecting Linux and Android devices but has the...

    Read Article
  • Stored Passwords Affected with macOS High Sierra

    Stored Passwords Affected with macOS High Sierra

    Recently a vulnerability was discovered in MacOS High Sierra, and earlier versions, affecting the Mac Keychain. This vulnerability allows for rogue applications to steal the plain text...

    Read Article
  • Inside the Hacker Group That is Targeting Global Industries

    Inside the Hacker Group That is Targeting Global Industries

    Recently Iranian linked hackers have been targeting companies within the U.S., Middle East, and Asia. The hackers, dubbed “APT33”, primary targets have been oil and commercial/military...

    Read Article
  • Is Google Chrome Leaving You Vulnerable?

    Is Google Chrome Leaving You Vulnerable?

    Google has recently released a patch to address multiple vulnerabilities within its browser, Google Chrome. These vulnerabilities could allow an attacker to take control of the affected...

    Read Article
  • 9 Ways You Can Protect Your Network

    9 Ways You Can Protect Your Network

    Cyber security has been a growing topic over the course of the last several years. There have been many high-profile events that disrupted business operations, caused financial loss and...

    Read Article
  • Could Your Browser Extension Leave You Vulnerable?

    Could Your Browser Extension Leave You Vulnerable?

    Cisco has released an alert regarding a vulnerability in its Cisco WebEx browser extension for Google Chrome and Mozilla Firefox. This vulnerability allows for an unauthenticated remote...

    Read Article
  • New Fileless Ransomware Has the Ability to Go Undetected

    New Fileless Ransomware Has the Ability to Go Undetected

    A fileless ransomware, SOREBRECT, that has recently been discovered, injects malicious code into a legitimate system process on the target system and will then remove itself in order to...

    Read Article
  • [UPDATE] The Latest Ransomware Attack That is Mimicking WannaCry

    [UPDATE] The Latest Ransomware Attack That is Mimicking WannaCry

    [Update 6/29] Indicators are now showing that, even though NotPetya disguises itself as ransomware, it actually works to lock the files permanently. Essentially, this is a cyber...

    Read Article
  • The Latest Ransomware Attack That is Mimicking WannaCry

    The Latest Ransomware Attack That is Mimicking WannaCry

    Today, another global ransomware attack has struck several nations and is using the same exploit utilized by WannaCry: EternalBlue. Currently, there have been several thousand...

    Read Article
  • How You Could Be Vulnerable to Recent North Korean Cyber Attacks

    How You Could Be Vulnerable to Recent North Korean Cyber Attacks

    The United States Computer Emergency Readiness Team (US-CERT), in joint efforts with the Department of Homeland Security (DHS), has recently been alerted to recent malicious actions of...

    Read Article
  • UIWIX Ransomware/Adylkuzz Malware

    UIWIX Ransomware/Adylkuzz Malware

    UIWIX Ransomware

    Read Article
  • HP Keylogger Vulnerability

    HP Keylogger Vulnerability

    In 2015 HP released an audio driver on a number of systems that inadvertently acted as a keylogger. This could potentially allow a malicious individual to record critical information...

    Read Article
  • WannaCry Ransomware Update

    WannaCry Ransomware Update

    Reports are now showing that WannaCry Ransomware has affected 200,000 victims in 150 different countries. On Monday experts expected the issue to escalate due to users returning to work...

    Read Article
  • WannaCry Ransomware

    WannaCry Ransomware

    In the last few days over 75,000 ransomware attacks have occurred in 99 different countries. WannaCry is possibly one of the largest global cyber-attacks to date and has wreaked havoc...

    Read Article
  • Cisco WebEx Meetings Server Information Disclosure Vulnerability

    Cisco WebEx Meetings Server Information Disclosure Vulnerability

    Recently a vulnerability was found affecting the Cisco WebEx Meetings Server. This vulnerability could allow for an unauthenticated remote attacker to gain information that could allow...

    Read Article
  • Cisco Product Vulnerability Alerts

    Cisco Product Vulnerability Alerts

    Cisco has identified several vulnerabilities related to some of its technology offerings. A few examples would include the CVR100W Wireless-N VPN Router, TelePresence and IOS XR...

    Read Article
  • Microsoft "Crazy Bad" Zero-Day Vulnerability

    Microsoft "Crazy Bad" Zero-Day Vulnerability

    Days ago a vulnerability was discovered in the Microsoft Malware Protection Engine of the Windows Operating System. This Malware Protection Engine is used by Windows Defender and other...

    Read Article
  • Google Doc Phishing Campaign

    Google Doc Phishing Campaign

    Read Article
  • Intel Product Vulnerability Advisory

    Intel Product Vulnerability Advisory

    Read Article
  • loading
    Loading More...