Citrix announces the release of patches for fixing a set of 11 critical flaws found in three of its networking products: Citrix ADC,  Citrix Gateway, and Citrix SD-WAN WANOP appliance models 4000-WO, 4100-WO, 5000-WO, and 5100-WO. As per the Citrix sources, the vulnerabilities don’t have any trace of active exploitation, and 5 out of the […]

Read More →
F5 BIG-IP Devices Under Active Exploitation

F5 BIG-IP is a multi-purpose networking device manufactured by F5 Networks which can be configured to work as traffic shaping system, firewall, load balancer, access gateway, rate limiter or SSL middleware. F5 BIG-IP devices are one of the most popular networking products and are widely used in government networks, banks, on the networks of internet […]

Read More →
Apache Guacamole Critical Vulnerabilities

Security researchers at Check Point have uncovered multiple critical reverse RDP vulnerabilities in the Apache Guacamole. Apache Guacamole is a clientless remote desktop gateway. It supports standard protocols like VNC, RDP, and SSH, together with MFA (Multi-Factor Authentication), compliance checks on the BYOD side, and several security controls like IPS, SOC anomaly detections and more. […]

Read More →

Microsoft has released patches to fix two remote code execution vulnerabilities in Microsoft Windows Codecs Library. HEVC or Windows codecs library is responsible for handling large media files and decoding them for playback. HEVC is used by developers as it supports a multitude of different file formats. This Windows Extension is designed to take advantage […]

Read More →
Data Breach

The term data breach refers to any misfortunate event where confidential information is exposed to unauthorized users. Such incidents not only cause life-damaging fines but also destroys an organization’s hard-earned reputation and trust. The digital landscape allows information to be scattered all over the place. Attackers are finding every way to access such information. The […]

Read More →
Software Deployment

Software Deployment, an ongoing IT administrator routine Organizations are growing at a faster pace these days and, so are their software requirements. Every organization has different departments and user roles, thus leading to a different set of software requirements. It is not easy to satisfy each department’s software needs, and often IT administrators find this […]

Read More →
Cyber Hygiene Misbeliefs

COVID19 has taught the world the powerful lessons on personal hygiene. Given that work from home culture is turning out to be the new norm and big organizations are already passing regulations on continuing it for the next few years, cyber hygiene is an important topic the world should be prepared to handle now. Whether […]

Read More →
Antivirus is not effective

Antiviruses are often known as an organization’s security shield. Initially, antiviruses were programmed to detect computer viruses. As the computer attacks started to become sophisticated, antiviruses also step up their game to fight against various computer attacks. As attackers are finding new and clever ways to infect the organization’s endpoints, antivirus shields are not leveling […]

Read More →
Critical 'Ripple20' Vulnerabilities Affecting Millions of Internet Connected Devices

Treck TCP/IP is a high-performance TCP/IP protocol suite designed for embedded systems. A set of 19 critical and high-severity security vulnerabilities have been discovered by Israeli security research firm JSOF in a low-level TCP/IP software library developed by Treck. Dubbed “Ripple20“, affecting hundreds of millions of internet of things (IoT) and industrial control devices. If […]

Read More →