Apache Guacamole Critical Vulnerabilities

Security researchers at Check Point have uncovered multiple critical reverse RDP vulnerabilities in the Apache Guacamole. Apache Guacamole is a clientless remote desktop gateway. It supports standard protocols like VNC, RDP, and SSH, together with MFA (Multi-Factor Authentication), compliance checks on the BYOD side, and several security controls like IPS, SOC anomaly detections and more. […]

Read More →

Microsoft has released patches to fix two remote code execution vulnerabilities in Microsoft Windows Codecs Library. HEVC or Windows codecs library is responsible for handling large media files and decoding them for playback. HEVC is used by developers as it supports a multitude of different file formats. This Windows Extension is designed to take advantage […]

Read More →
Data Breach

The term data breach refers to any misfortunate event where confidential information is exposed to unauthorized users. Such incidents not only cause life-damaging fines but also destroys an organization’s hard-earned reputation and trust. The digital landscape allows information to be scattered all over the place. Attackers are finding every way to access such information. The […]

Read More →
Software Deployment

Software Deployment, an ongoing IT administrator routine Organizations are growing at a faster pace these days and, so are their software requirements. Every organization has different departments and user roles, thus leading to a different set of software requirements. It is not easy to satisfy each department’s software needs, and often IT administrators find this […]

Read More →
Cyber Hygiene Misbeliefs

COVID19 has taught the world the powerful lessons on personal hygiene. Given that work from home culture is turning out to be the new norm and big organizations are already passing regulations on continuing it for the next few years, cyber hygiene is an important topic the world should be prepared to handle now. Whether […]

Read More →
Antivirus is not effective

Antiviruses are often known as an organization’s security shield. Initially, antiviruses were programmed to detect computer viruses. As the computer attacks started to become sophisticated, antiviruses also step up their game to fight against various computer attacks. As attackers are finding new and clever ways to infect the organization’s endpoints, antivirus shields are not leveling […]

Read More →
Critical 'Ripple20' Vulnerabilities Affecting Millions of Internet Connected Devices

Treck TCP/IP is a high-performance TCP/IP protocol suite designed for embedded systems. A set of 19 critical and high-severity security vulnerabilities have been discovered by Israeli security research firm JSOF in a low-level TCP/IP software library developed by Treck. Dubbed “Ripple20“, affecting hundreds of millions of internet of things (IoT) and industrial control devices. If […]

Read More →
Cyber Attacks 2020

As the world fights for its survival against COVID19, most of us are now extra conscious about our hygiene. During this tough situation isn’t it important to look after the asset hygiene as well? 2020 is a year to remember throughout life. Many things have happened and maybe a lot to expect in the upcoming […]

Read More →
Critical Adobe Update - June 2020

  Adobe has released critical security updates to its products like Adobe After Effects, Illustrator 2020, Adobe Campaign Classic, and others in order to patch multiple critical vulnerabilities which can lead to arbitrary code execution and information disclosure. This month’s release consists of 19 vulnerabilities addressed in 6 advisories: 19 vulnerabilities of which 18 are […]

Read More →