Skip to content
vshieldz
Home Page
Services
Our Partner
News
Contact

Call us anytime

+84949482065

Author: System

This author has written 400 articles
  1. Home>
  2. System>
  3. Page 7
Read more about the article 0.0.0.0 Vulnerability

0.0.0.0 Vulnerability

  • Post author:System
  • Post published:10 August 2024
  • Post category:Blog & News

Researchers at Oligo Security have identified a zero-day vulnerability affecting all major browsers that could be exploited to bypass browser security and possibly access local networks. According to the researchers,…

Continue Reading0.0.0.0 Vulnerability
Read more about the article CrowdStrike Publishes External Technical Root Cause Analysis

CrowdStrike Publishes External Technical Root Cause Analysis

  • Post author:System
  • Post published:10 August 2024
  • Post category:Blog & News

CrowdStrike has published a technical root cause analysis of the July 19 incident that disrupted travel and commerce worldwide due to an out-of-bounds read issue “beyond the end of the…

Continue ReadingCrowdStrike Publishes External Technical Root Cause Analysis
Read more about the article Police in Singapore Recover Millions Stolen in Business eMail Compromise Scheme

Police in Singapore Recover Millions Stolen in Business eMail Compromise Scheme

  • Post author:System
  • Post published:8 August 2024
  • Post category:Blog & News

Authorities have seized over $41 million that was stolen from a commodities firm in Singapore in a business email compromise (BEC) attack. The thieves, impersonating a supplier, requested that a…

Continue ReadingPolice in Singapore Recover Millions Stolen in Business eMail Compromise Scheme
Read more about the article Linux Kernel SLUBStick Attack

Linux Kernel SLUBStick Attack

  • Post author:System
  • Post published:8 August 2024
  • Post category:Blog & News

Researchers from Graz University of Technology in Austria have published a paper that describes “a novel kernel exploitation technique elevating a limited heap vulnerability to an arbitrary memory read-and-write primitive.”…

Continue ReadingLinux Kernel SLUBStick Attack
Read more about the article AWS is Using a Neural Network to Detect Malicious Domains

AWS is Using a Neural Network to Detect Malicious Domains

  • Post author:System
  • Post published:8 August 2024
  • Post category:Blog & News

AWS says it is using a neural network called Mithra, “a massive internal neural network graph model … that uses algorithms for threat intelligence” to identify malicious domains. Mithra has…

Continue ReadingAWS is Using a Neural Network to Detect Malicious Domains
Read more about the article US Sanctions Hackers Who Targeted Water Utilities

US Sanctions Hackers Who Targeted Water Utilities

  • Post author:System
  • Post published:30 July 2024
  • Post category:Blog & News

The US Treasury Department has imposed sanctions on two individuals for their alleged involvement in cyberattacks against elements of US critical infrastructure. Yuliya Pankratova allegedly oversaw operations for a hacking…

Continue ReadingUS Sanctions Hackers Who Targeted Water Utilities
Read more about the article Stargazers Ghost Network

Stargazers Ghost Network

  • Post author:System
  • Post published:28 July 2024
  • Post category:Blog & News

Check Point Research has discovered a network of GitHub accounts that have been used to distribute malware and malicious links. The accounts also “perform other actions such as starring, forking,…

Continue ReadingStargazers Ghost Network
Read more about the article CrowdStrike Says Buggy Test Software is Responsible for Faulty Update

CrowdStrike Says Buggy Test Software is Responsible for Faulty Update

  • Post author:System
  • Post published:28 July 2024
  • Post category:Blog & News

In a Preliminary Post Incident Review, CrowdStrike explains how they missed the error in the Falcon update for Windows last week. CrowdStrike says that a bug in their “Content Validator”…

Continue ReadingCrowdStrike Says Buggy Test Software is Responsible for Faulty Update
Read more about the article KnowBe4 Hired a North Korean Hacker Who Used a Stolen Identity

KnowBe4 Hired a North Korean Hacker Who Used a Stolen Identity

  • Post author:System
  • Post published:28 July 2024
  • Post category:Blog & News

Security firm KnowBe4 is sharing a cautionary tale. A North Korean hacker used a stolen identity to apply for a position as a software engineer at KnowBe4. Thanks to the…

Continue ReadingKnowBe4 Hired a North Korean Hacker Who Used a Stolen Identity
Read more about the article Ransomware Operators are Exploiting Known Veeam Vulnerability

Ransomware Operators are Exploiting Known Veeam Vulnerability

  • Post author:System
  • Post published:18 July 2024
  • Post category:Blog & News

A ransomware group is exploiting a known vulnerability in Veeam to infect systems with a LockBit variant. A fix for the high-severity flaw in Veeam Backup & Replication software was…

Continue ReadingRansomware Operators are Exploiting Known Veeam Vulnerability
  • Go to the previous page
  • 1
  • …
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • …
  • 40
  • Go to the next page
footer
vShieldz Technologies Ltd
+84949482065
  • [email protected]
  • 429 Le Van Viet st, Tang Nhon Phu A, Thu Duc, Ho Chi Minh city, Vietnam

links

  • Our Partner
  • Our Services
  • Contact Us
  • News

recent post

  • To Be (A Robot) or Not to Be: New Malware Attributed to Russia State-Sponsored COLDRIVER
    To Be (A Robot) or Not to Be: New Malware Attributed to Russia State-Sponsored COLDRIVER
    21 October 2025/
    0 Comments
  • GlassWorm: First Self-Propagating Worm Using Invisible Code Hits OpenVSX Marketplace
    GlassWorm: First Self-Propagating Worm Using Invisible Code Hits OpenVSX Marketplace
    21 October 2025/
    0 Comments
Copyright 2021 vShieldz Technologies Ltd
Thiết Kế Bởi Vĩnh XD