Archive for the
‘Vulnerabilities and Exploits’ Category

Iranian Hackers Re-Exploiting An Almost Two Year Old Microsoft Vulnerability US Cyber Command took to Twitter to sound the alarm about probable APT33 hackers sudden increased use of a two year old Microsoft vulnerability.  The vulnerability was identified in 2017 as CVE-2017-11774 aka the “Microsoft Outlook Security Feature Bypass Vulnerability.”  This vulnerability was patched by […]

The Data A cyber security firm has found a database that was weakly protected.  The data belongs to an analytics firm based out of California called Alteryx.  The affected data comes from some of Alteryx partners. Those partners exposed by the leak were Experian, the credit agency, and the US Census Bureau.  Other partners of […]

Something more to consider when putting together your BYOD policies:  Researchers at University of Alabama at Birmingham have demonstrated the use of smartphone sound, light and magnetic sensors as triggers for malware.  This would allow for malware creators to pick environmental conditions as a trigger and expand targeting options.  Read the full pdf here:  Sensing-Enabled […]

0
1
image
https://protocol46.com/wp-content/themes/blake/
https://protocol46.com//
#1771b9
style2
scroll
Loading posts...
/home/p46webadmin/public_html/
#
on
none
loading
#
Sort Gallery
https://protocol46.com/wp-content/themes/blake
on
yes
yes
off
Enter your email here
on
off