There are malevolent endeavors that happen with the utilization of what are known as "zero-day exploits" that launch attacks on your sensitive data and technological infrastructure. Today, we explain what a zero-day exploit is and why they are such a threat to business.
The Kaseya ransomware attack targeting VSA servers for approximately 1,500 organizations was another notable attack in a recent string of high-profile ransomware attacks, and while most organizations did what most security professionals recommend and did not pay the ransom, others did not listen. Now those who did pay the ransom are having trouble decrypting their data, and REvil is nowhere to be found to help them in this effort.
A new exploit is making the rounds in the security environment, and this time, it affects virtual private networks. According to Cisco, the flaw affects its Adaptive Security Appliance (ASA) tool, and it should be patched as quickly as possible. If you don’t do so, your organization could be subject to remote code exploitation as a result of this vulnerability.
Just a few months after finding themselves in a firmware fiasco, Intel is making news for all the wrong reasons. This issue had the potential to affect the CPU of a device, causing a severe dip in the performance of the device.
When a security researcher tweeted about what they thought was “the worst Windows remote code exec” in his memory, a recent incident came to mind: one that allowed a targeted file to implement remote code execution processes in order to manipulate any infected system. This vulnerability let the infected machine spread the issue to others and could be set off if a certain file were to be scanned by the Microsoft Malware Protection Engine. Scary stuff!