Skip to content
vshieldz
Home Page
Services
Our Partner
News
Contact

Call us anytime

+84949482065

News

  1. Home>
  2. News>
  3. Page 6
Read more about the article There are Now 400 CVE Numbering Authorities (CNAs)

There are Now 400 CVE Numbering Authorities (CNAs)

  • Post author:System
  • Post published:22 August 2024
  • Post category:Blog & News

Earlier this month, MITRE added Wiz to its list of CVE Naming Authorities, bringing the total numbers of CNAs to 400. This milestone comes at a time when the US…

Continue ReadingThere are Now 400 CVE Numbering Authorities (CNAs)
Read more about the article Cisco Talos: Vulnerabilities in Microsoft Apps for macOS

Cisco Talos: Vulnerabilities in Microsoft Apps for macOS

  • Post author:System
  • Post published:22 August 2024
  • Post category:Blog & News

Researchers from Cisco Talos have provided details about eight vulnerabilities in Microsoft apps for macOS. The flaws could be exploited by injecting specially crafted libraries into the apps to access…

Continue ReadingCisco Talos: Vulnerabilities in Microsoft Apps for macOS
Read more about the article Ransomware attackers introduce new EDR killer to their arsenal

Ransomware attackers introduce new EDR killer to their arsenal

  • Post author:System
  • Post published:17 August 2024
  • Post category:Blog & News

A threat actor linked to the RansomHub ransomware has been observed using a new tool EDRKillShifter that can terminate EDR software on compromised systems. More info https://news.sophos.com/en-us/2024/08/14/edr-kill-shifter/

Continue ReadingRansomware attackers introduce new EDR killer to their arsenal
Read more about the article Kibana arbitrary code execution via prototype pollution (ESA-2024-22)

Kibana arbitrary code execution via prototype pollution (ESA-2024-22)

  • Post author:System
  • Post published:17 August 2024
  • Post category:Blog & News

A critical security flaw, CVE-2024-37287, has been identified in Kibana, an open-source data visualization and exploration tool, which could allow attackers to execute arbitrary code via a prototype pollution vulnerability.…

Continue ReadingKibana arbitrary code execution via prototype pollution (ESA-2024-22)
Read more about the article Hijacked: How Cybercriminals Are Turning Anti-Virus Software Against You

Hijacked: How Cybercriminals Are Turning Anti-Virus Software Against You

  • Post author:System
  • Post published:17 August 2024
  • Post category:Blog & News

Threat actors have been found hijacking legitimate anti-virus software to conduct undetected malicious activities, using a new tool called SbaProxy that masquerades as legitimate anti-virus components to create proxy connections…

Continue ReadingHijacked: How Cybercriminals Are Turning Anti-Virus Software Against You
Read more about the article NIST Releases Post-Quantum Cryptography Standards

NIST Releases Post-Quantum Cryptography Standards

  • Post author:System
  • Post published:17 August 2024
  • Post category:Blog & News

The US National Institute of Standards and Technology (NIST) has published three post-quantum cryptography (PQC) algorithms: ML-KEM (Kyber), ML-DSA (Dilithium), and SLH-DSA (Sphincs+). A fourth algorithm, FN-DSA (FALCON), is expected…

Continue ReadingNIST Releases Post-Quantum Cryptography Standards
Read more about the article Crash Reports Hold Valuable Vulnerability Information

Crash Reports Hold Valuable Vulnerability Information

  • Post author:System
  • Post published:10 August 2024
  • Post category:Blog & News

Speaking at the BlackHat USA conference earlier this week, security researcher Patrick Wardle said that computer crash reports offer “a myriad of information that will allow us to extract malware,…

Continue ReadingCrash Reports Hold Valuable Vulnerability Information
Read more about the article 0.0.0.0 Vulnerability

0.0.0.0 Vulnerability

  • Post author:System
  • Post published:10 August 2024
  • Post category:Blog & News

Researchers at Oligo Security have identified a zero-day vulnerability affecting all major browsers that could be exploited to bypass browser security and possibly access local networks. According to the researchers,…

Continue Reading0.0.0.0 Vulnerability
Read more about the article CrowdStrike Publishes External Technical Root Cause Analysis

CrowdStrike Publishes External Technical Root Cause Analysis

  • Post author:System
  • Post published:10 August 2024
  • Post category:Blog & News

CrowdStrike has published a technical root cause analysis of the July 19 incident that disrupted travel and commerce worldwide due to an out-of-bounds read issue “beyond the end of the…

Continue ReadingCrowdStrike Publishes External Technical Root Cause Analysis
Read more about the article Police in Singapore Recover Millions Stolen in Business eMail Compromise Scheme

Police in Singapore Recover Millions Stolen in Business eMail Compromise Scheme

  • Post author:System
  • Post published:8 August 2024
  • Post category:Blog & News

Authorities have seized over $41 million that was stolen from a commodities firm in Singapore in a business email compromise (BEC) attack. The thieves, impersonating a supplier, requested that a…

Continue ReadingPolice in Singapore Recover Millions Stolen in Business eMail Compromise Scheme
  • Go to the previous page
  • 1
  • …
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • …
  • 40
  • Go to the next page
footer
vShieldz Technologies Ltd
+84949482065
  • [email protected]
  • 429 Le Van Viet st, Tang Nhon Phu A, Thu Duc, Ho Chi Minh city, Vietnam

links

  • Our Partner
  • Our Services
  • Contact Us
  • News

recent post

  • Your Mobile App, Their Playground: The Dark side of the Virtualization
    Your Mobile App, Their Playground: The Dark side of the Virtualization
    23 June 2025/
    0 Comments
  • FBI Warns of Voicemail and Text Deepfakes Impersonating Government Officials
    FBI Warns of Voicemail and Text Deepfakes Impersonating Government Officials
    28 May 2025/
    0 Comments
Copyright 2021 vShieldz Technologies Ltd
Thiết Kế Bởi Vĩnh XD