VMWARE PATCHES BUG THAT ALLOWS GUEST TO EXECUTE CODE ON HOST

cyber

Users who run four different types of VMware products, ESXi, vCenter Server, Fusion and Workstation, are being encouraged to update to address a series of vulnerabilities, one critical. The most serious issue, an out-of-bounds write vulnerability, exists in ESXi, and desktop hypervisors Workstation, and Fusion. An attacker could exploit the […]

Google Chrome most resilient against attacks, researchers find

cyber

Researchers have analyzed Google Chrome, Microsoft Edge, and Internet Explorer, and found Chrome to be the most resilient against attacks. “Modern web browsers such as Chrome or Edge improved security in recent years. Exploitation of vulnerabilities is certainly more complex today and requires a higher skill than in the past. […]

Global DDoS mitigation market trends and developments

cyber

Frost & Sullivan found that the DDoS mitigation market generated a revenue of $816 million in 2016 and is expected to register a CAGR of 17.1 percent through 2021. Threat actors’ continuous development of new techniques to overwhelm their target’s defenses and improve effectiveness of their DDoS attacks in terms of scale, […]

WikiLeaks suffers defacement at the hands of OurMine group

cyber

WikiLeaks’ whistleblowing website suffered an attack from the group known as OurMine on Thursday, when Julian Assange’s data-leaking site found itself on the receiving end of a ‘hack’. To read the original article : https://www.welivesecurity.com/2017/09/01/wikileaks-suffer-defacement-ourmine-group/

More than one million new phishing sites created each month

cyber

Phishing attacks continue to increase in volume and sophistication, according to researchers at security firm Webroot Phishing attacks are highly targeted, sophisticated, hard to detect and difficult for users to avoid, with 1.39 million new phishing sites created each month, say security researchers. In May 2017, the number of new phishing […]

Researchers link CCLEANER hack to cyberespionage group

cyber

The recent attack that resulted in 2.2 million users installing infected versions of a popular Windows system optimization tool might have been the work of a sophisticated cyberespionage group with a history of software supply chain compromises. Researchers from two security companies have established links between the malicious code surreptitiously added […]