Home 2022
Yearly Archives: 2022
Difference Between Agent-Based and Network-Based Internal Vulnerability Scanning
For years, the two most popular methods for internal scanning: agent-based and network-based were considered to be about equal in value, each bringing its...
High-Severity RCE Vulnerability Reported in Popular Fastjson Library
Cybersecurity researchers have detailed a recently patched high-severity security vulnerability in the popular Fastjson library that could be potentially exploited to achieve remote code execution.
Tracked as CVE-2022-25845 (CVSS...
MaliBot: A New Android Banking Trojan Spotted in the Wild
A new strain of Android malware has been spotted in the wild targeting online banking and cryptocurrency wallet customers in Spain and Italy, just...
Critical Flaw in Cisco Secure Email and Web Manager Lets Attackers Bypass Authentication
Cisco on Wednesday rolled out fixes to address a critical security flaw affecting Email Security Appliance (ESA) and Secure Email and Web Manager that...
Panchan: A New Golang-based Peer-To-Peer Botnet Targeting Linux Servers
A new Golang-based peer-to-peer (P2P) botnet has been spotted actively targeting Linux servers in the education sector since its emergence in March 2022.
Dubbed Panchan by Akamai...
New Hertzbleed Side Channel Attack Affects All Modern AMD and Intel CPUs
A newly discovered security vulnerability in modern Intel and AMD processors could let remote attackers steal encryption keys via a power side channel attack.
Dubbed Hertzbleed by...
Comprehensive, Easy Cybersecurity for Lean IT Security Teams Starts with XDR
Breaches don't just happen to large enterprises. Threat actors are increasingly targeting small businesses. In fact, 43% of data breaches involved small to medium-sized businesses. But...
Top 5 Online Frauds Targeting Americans
The benefits of technology are immense. Sitting in your home, you can pay your bills, shop for groceries and gadgets, and communicate with family...
What Is Computer Maintenance?
Most companies rely on their computer networks to provide meaningful assistance in the delivery of top quality services. Equipment failure might have disastrous consequences...
5 Benefits of Data Backup
As far as the security of vital information goes, it's important that business owners take necessary steps to make sure that the data is...