Skip to content
vshieldz
Home Page
Services
Our Partner
News
Contact

Call us anytime

+84949482065

Author: System

This author has written 398 articles
  1. Home>
  2. System>
  3. Page 6
Read more about the article Mandatory MFA for Azure

Mandatory MFA for Azure

  • Post author:System
  • Post published:22 August 2024
  • Post category:Blog & News

Microsoft is rolling out mandatory multi-factor authentication (MFA) for Azure starting on October. At that time, “MFA will be required to sign-in to Azure portal, Microsoft Entra admin center, and…

Continue ReadingMandatory MFA for Azure
Read more about the article There are Now 400 CVE Numbering Authorities (CNAs)

There are Now 400 CVE Numbering Authorities (CNAs)

  • Post author:System
  • Post published:22 August 2024
  • Post category:Blog & News

Earlier this month, MITRE added Wiz to its list of CVE Naming Authorities, bringing the total numbers of CNAs to 400. This milestone comes at a time when the US…

Continue ReadingThere are Now 400 CVE Numbering Authorities (CNAs)
Read more about the article Cisco Talos: Vulnerabilities in Microsoft Apps for macOS

Cisco Talos: Vulnerabilities in Microsoft Apps for macOS

  • Post author:System
  • Post published:22 August 2024
  • Post category:Blog & News

Researchers from Cisco Talos have provided details about eight vulnerabilities in Microsoft apps for macOS. The flaws could be exploited by injecting specially crafted libraries into the apps to access…

Continue ReadingCisco Talos: Vulnerabilities in Microsoft Apps for macOS
Read more about the article Ransomware attackers introduce new EDR killer to their arsenal

Ransomware attackers introduce new EDR killer to their arsenal

  • Post author:System
  • Post published:17 August 2024
  • Post category:Blog & News

A threat actor linked to the RansomHub ransomware has been observed using a new tool EDRKillShifter that can terminate EDR software on compromised systems. More info https://news.sophos.com/en-us/2024/08/14/edr-kill-shifter/

Continue ReadingRansomware attackers introduce new EDR killer to their arsenal
Read more about the article Kibana arbitrary code execution via prototype pollution (ESA-2024-22)

Kibana arbitrary code execution via prototype pollution (ESA-2024-22)

  • Post author:System
  • Post published:17 August 2024
  • Post category:Blog & News

A critical security flaw, CVE-2024-37287, has been identified in Kibana, an open-source data visualization and exploration tool, which could allow attackers to execute arbitrary code via a prototype pollution vulnerability.…

Continue ReadingKibana arbitrary code execution via prototype pollution (ESA-2024-22)
Read more about the article Hijacked: How Cybercriminals Are Turning Anti-Virus Software Against You

Hijacked: How Cybercriminals Are Turning Anti-Virus Software Against You

  • Post author:System
  • Post published:17 August 2024
  • Post category:Blog & News

Threat actors have been found hijacking legitimate anti-virus software to conduct undetected malicious activities, using a new tool called SbaProxy that masquerades as legitimate anti-virus components to create proxy connections…

Continue ReadingHijacked: How Cybercriminals Are Turning Anti-Virus Software Against You
Read more about the article NIST Releases Post-Quantum Cryptography Standards

NIST Releases Post-Quantum Cryptography Standards

  • Post author:System
  • Post published:17 August 2024
  • Post category:Blog & News

The US National Institute of Standards and Technology (NIST) has published three post-quantum cryptography (PQC) algorithms: ML-KEM (Kyber), ML-DSA (Dilithium), and SLH-DSA (Sphincs+). A fourth algorithm, FN-DSA (FALCON), is expected…

Continue ReadingNIST Releases Post-Quantum Cryptography Standards
Read more about the article Crash Reports Hold Valuable Vulnerability Information

Crash Reports Hold Valuable Vulnerability Information

  • Post author:System
  • Post published:10 August 2024
  • Post category:Blog & News

Speaking at the BlackHat USA conference earlier this week, security researcher Patrick Wardle said that computer crash reports offer “a myriad of information that will allow us to extract malware,…

Continue ReadingCrash Reports Hold Valuable Vulnerability Information
Read more about the article 0.0.0.0 Vulnerability

0.0.0.0 Vulnerability

  • Post author:System
  • Post published:10 August 2024
  • Post category:Blog & News

Researchers at Oligo Security have identified a zero-day vulnerability affecting all major browsers that could be exploited to bypass browser security and possibly access local networks. According to the researchers,…

Continue Reading0.0.0.0 Vulnerability
Read more about the article CrowdStrike Publishes External Technical Root Cause Analysis

CrowdStrike Publishes External Technical Root Cause Analysis

  • Post author:System
  • Post published:10 August 2024
  • Post category:Blog & News

CrowdStrike has published a technical root cause analysis of the July 19 incident that disrupted travel and commerce worldwide due to an out-of-bounds read issue “beyond the end of the…

Continue ReadingCrowdStrike Publishes External Technical Root Cause Analysis
  • Go to the previous page
  • 1
  • …
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • …
  • 40
  • Go to the next page
footer
vShieldz Technologies Ltd
+84949482065
  • [email protected]
  • 429 Le Van Viet st, Tang Nhon Phu A, Thu Duc, Ho Chi Minh city, Vietnam

links

  • Our Partner
  • Our Services
  • Contact Us
  • News

recent post

  • How DarkCloud Stealer is Targeting Financial Organizations
    How DarkCloud Stealer is Targeting Financial Organizations
    16 September 2025/
    0 Comments
  • Your Mobile App, Their Playground: The Dark side of the Virtualization
    Your Mobile App, Their Playground: The Dark side of the Virtualization
    23 June 2025/
    0 Comments
Copyright 2021 vShieldz Technologies Ltd
Thiết Kế Bởi Vĩnh XD