What Is Vulnerability Scanning? Vulnerability Scanning is an automated process of identifying network, application, and security vulnerabilities. Vulnerability scanning is performed by the technology department of an organization or a third-party service provider. Vulnerability scanners […]
The Weekly Roundup (2020-November-14)

2020 – November 09 Breaches Reported The group Luxottica (who owns LensCrafters, Target Optical, and EyeMed) just recently disclosed a data breach that occurred on August 5, 2020. The breach came from their online appointment […]
Top Five Exploited Vulnerabilities By Chinese State-Sponsored Actors

Back on October 20, 2020, the United States National Security Agency (NSA) published a cybersecurity advisory about Chinese state-sponsored malicious cyber activity. This post we will be covering 5 of those vulnerabilities. “Since these techniques include exploitation […]
The Weekly Roundup – October 31, 2020

October 26, 2020 DeFi Offering $100k Reward A decentralized finance (DeFi) protocol is offering a $100k reward for help in contacting its alleged cyber-attacker. Tweet posted a week ago that Harvest Finance had allegedly been targeted by an unknown […]
CVE-2020-17087 – Windows Kernel local privilege escalation 0day

Security researchers from Google Project Zero team has disclosed a zero-day vulnerability in Windows OS and that it is currently being exploited in the wild. Credited: Mateusz Jurczyk and Sergei Glazunov of Google Project Zero […]
The Weekly Cybersecurity Roundup – October 24, 2020

October 19th, 2020 Vizom malware Researchers have encounter a replacement malware variant, dubbed Vizom, that’s being actively utilized in a lively campaign across Brazil. The malware is currently being used to compromise bank accounts via […]
Microsoft “Zerologon” Elevation of Privilege Vulnerability (CVE-2020-1472)

“An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC). An attacker who successfully exploited the vulnerability could run […]
GlueBall Vulnerability (CV-2020-1464)

Microsoft finally patched a zero-day that has existed for years named “GlueBall” (CV-2020-1464: Windows Spoofing Vulnerability). A spoofing vulnerability exists when Windows incorrectly validates file signatures. An attacker who successfully exploited this vulnerability could bypass […]