Containerising legacy apps and servers protects them from security threats which helps you achieve compliance and delivers significant cost savings when it comes to deploying apps, not only in acquisition, but also in management costs and lower infrastructure overheads.
Blog Category: Security
Late on Friday 20th November, Manchester United Football Club released a statement announcing they had been victims of “a sophisticated operation by organised cyber criminals”.
Phone spear phishing is a form of social engineering that was used to great effect in the recent high-profile Twitter hack. It’s not a new practice, but the massive rise in remote working during the COVID-19 pandemic has made it far more powerful, and so businesses need to be wary of the threat.
In early July Project Sonar found just under 50,000 Microsoft DNS servers in UDP and TCP DNS scans with the vulnerability. They also discovered that 20 companies in the Fortune 500 had 250 at-risk servers exposed to the outside world.
A remote code execution vulnerability for Microsoft DNS Server has been scored a maximum 10/10 on the CVSS scoring matrix. This poses a massive risk to businesses around the world and highlights the importance of regular and comprehensive patching.
A vulnerability has been identified in Citrix Application Delivery Controller (ADC), which could allow an unauthenticated party to perform arbitrary code execution. This issue impacts all ADC and ADC Gateway versions 10.5 through 13.0 and could potentially expose the networks of over 80,000 firms.
The implications of the Travelex attack have been felt globally and reports state that only today are Travelex able to start bringing systems back online, two weeks after the initial attack.
As you may be aware, there have been several publications and reports released during the past week reporting several vulnerabilities that could potentially be exploited with some Intel, AMD and ARM CPUs.
On Monday a fairly significant flaw in the WPA2 wireless encryption protocol was uncovered and since it’s a flaw in the original design, it affects all modern protected Wi-Fi networks.
In recent years cyber-thieves have adopted ransomware in alarming numbers and experts have now catalogued more than 120 separate families of ransomware. You will …