Skip to content
(203) 806-0120Bridgewater Corners, VT 05035[email protected]
Facebook page opens in new windowTwitter page opens in new window
Login
JM Computers
If you can break it, I can fix it!
JM ComputersJM Computers
  • Home
  • Services & Offers
  • Current Threats
  • Contact
  • Social
  • Home
  • Services & Offers
  • Current Threats
  • Contact
  • Social

Category Archives: Vulnerabilities

You are here:
  1. Home
  2. Category "Vulnerabilities"

High-Severity RCE Bug Found in Popular Apache Cassandra Database

Vulnerabilities, Web SecurityBy Jeremy McClureFebruary 16, 2022

On the plus side, only instances with non-standard not recommended configurations are vulnerable. On the downside, those configurations aren’t easy to track down, and it’s easy as pie to exploit. High-Severity RCE Bug Found in Popular Apache Cassandra Database

Critical VMware Bugs Open ESXi, Fusion & Workstation to Attackers

Cloud Security, VulnerabilitiesBy Jeremy McClureFebruary 16, 2022

A group of five security vulnerabilities could lead to a range of bad outcomes for virtual-machine enthusiasts, including command execution and DoS. Critical VMware Bugs Open ESXi, Fusion & Workstation to Attackers

SquirrelWaffle Adds a Twist of Fraud to Exchange Server Malspamming

Malware, Vulnerabilities, Web SecurityBy Jeremy McClureFebruary 15, 2022

SquirrelWaffle attackers now use typosquatting to keep sending spam, even after Exchange servers are patched for ProxyLogon/ProxyShell. SquirrelWaffle Adds a Twist of Fraud to Exchange Server Malspamming

Chrome Zero-Day Under Active Attack: Patch ASAP

Vulnerabilities, Web SecurityBy Jeremy McClureFebruary 15, 2022

The year’s 1st Chrome zero-day can lead to all sorts of misery, ranging from data corruption to the execution of arbitrary code on vulnerable systems. Chrome Zero-Day Under Active Attack: Patch ASAP

Adobe: Zero-Day Magento 2 RCE Bug Under Active Attack

Vulnerabilities, Web SecurityBy Jeremy McClureFebruary 14, 2022

The vendor issued an emergency fix on Sunday, and eCommerce websites should update ASAP to avoid Magecart card-skimming attacks and other problems. Adobe: Zero-Day Magento 2 RCE Bug Under Active Attack

Critical MQTT-Related Bugs Open Industrial Networks to RCE Via Moxa

Critical Infrastructure, VulnerabilitiesBy Jeremy McClureFebruary 11, 2022

A collection of five security vulnerabilities with a collective CVSS score of 10 out of 10 threaten critical infrastructure environments that use Moxa MXview. Critical MQTT-Related Bugs Open Industrial Networks to RCE Via Moxa

Windows Container Malware Targets Kubernetes Clusters

Cloud Security, Vulnerabilities, Web SecurityBy Jeremy McClureJune 7, 2021

“Siloscape”, the first malware to target Windows containers, breaks out of Kubernetes clusters to plant backdoors and raid nodes for credentials. Windows Container Malware Targets Kubernetes Clusters

‘Battle for the Galaxy’ Mobile Game Leaks 6M Gamer Profiles

breach, VulnerabilitiesBy Jeremy McClureJune 3, 2021

Unprotected server exposes AMT Games user data containing user emails and purchase information. ‘Battle for the Galaxy’ Mobile Game Leaks 6M Gamer Profiles

Exchange Servers Targeted by ‘Epsilon Red’ Malware

Cryptography, Malware, VulnerabilitiesBy Jeremy McClureJune 3, 2021

REvil threat actors may be behind a set of PowerShell scripts developed for encryption and weaponized to exploit vulnerabilities in corporate networks, the ransom note suggests. Exchange Servers Targeted by ‘Epsilon Red’ Malware

Then and Now: Securing Privileged Access Within Healthcare Orgs

Cloud Security, Critical Infrastructure, infosec insider, Vulnerabilities, Web SecurityBy Jeremy McClureJune 3, 2021

Joseph Carson, chief security scientist and advisory CISO at ThycoticCentrify, discusses best practices for securing healthcare data against the modern threat landscape. Then and Now: Securing Privileged Access Within Healthcare Orgs

12345…
6789101112131415161718192021222324
25
JM Computers
Go to Top