Labels: News

Bug Google Chrome 0day Ditemukan

Bug Google Chrome 0day Ditemukan

Google telah membahas zero-day yang dieksploitasi di browser Chrome , menandai perbaikan…
PoC baru untuk bug Microsoft Exchange

PoC baru untuk bug Microsoft Exchange

Seorang peneliti keamanan telah merilis eksploitasi POC baru akhir minggu ini yang memer…
Memanfaatkan Vulnerability "Simple" - Dalam 35 Langkah

Memanfaatkan Vulnerability "Simple" - Dalam 35 Langkah

Pada bulan September MS telah memperbaiki  kerentanan  CVE-2020-1034.   Kerentanan Ini ad…
Peneliti Melihat Malware yang Ditulis dalam Bahasa Pemrograman Nim

Peneliti Melihat Malware yang Ditulis dalam Bahasa Pemrograman Nim

Peneliti keamanan siber ( Cybersecurity researcher ) telah membuka " interesting ema…
Hacker Menargetkan Server Microsoft Exchange Dengan Ransomware

Hacker Menargetkan Server Microsoft Exchange Dengan Ransomware

Tidak butuh waktu lama. Badan intelijen dan peneliti keamanan siber telah memperingatkan …
ProxyLogon POC dirilis, kemungkinan Memicu lebih banyak serangan Cyber

ProxyLogon POC dirilis, kemungkinan Memicu lebih banyak serangan Cyber

Cybersecurity Agency dan Infrastruktur AS (CISA) dan Biro Investigasi Federal (FBI) pad…
Google Photos, Whatsapp, And Doom On Deskphones

Google Photos, Whatsapp, And Doom On Deskphones

Google Photos is handy. You take pictures and videos on your cell phone, and they automa…
Over 100,000 Exchange Servers still vulnerable, including thousands in Canada

Over 100,000 Exchange Servers still vulnerable, including thousands in Canada

The potential for email hacking caused by vulnerabilities in on-premise installations of …
Microsoft fixes actively exploited Exchange zero-day bugs, patch now

Microsoft fixes actively exploited Exchange zero-day bugs, patch now

Microsoft has released emergency out-of-band security updates for all supported Microsoft…
ReportIng Top 10 Cybersecurity Vulnerabilities of 2020

ReportIng Top 10 Cybersecurity Vulnerabilities of 2020

What cybersecurity vulnerabilities new and old should organizations look out for this yea…
How China’s attack on Microsoft escalated into a “reckless” hacking spree

How China’s attack on Microsoft escalated into a “reckless” hacking spree

At first the Chinese hackers ran a careful campaign. For two months, they exploited weakn…
10 hacking groups are exploiting Microsoft Exchange flaws

10 hacking groups are exploiting Microsoft Exchange flaws

At least 10 hacking groups are exploiting Microsoft Exchange flaws Join Transform 2021 fo…