Threat

Tech Patrol

Australia Passes Anti-Encryption Bill (Everything You Need to Know)

On Thursday last week, Australia finally passed the “Telecommunications Assistance and Access Bill 2018,” also known as the Anti-Encryption Bill, that would now allow law enforcement to force Google, Facebook, WhatsApp, Signal, and other tech giants to help them access encrypted communications. The more has come out of this and through this article, we will …

Australia Passes Anti-Encryption Bill (Everything You Need to Know) Read More »

Tech-Patrol

Adobe Flash Zero-Day Exploit Found Hidden Inside MS Office Docs

Vulnerabilities have been found within Adobe once again. Cybersecurity researchers have discovered a new zero-day vulnerability in Adobe Flash Player that hackers are actively exploiting in the wild as part of a targeted campaign that appears to be targeting a Russian state health care institution before it moves to the rest of the world. The …

Adobe Flash Zero-Day Exploit Found Hidden Inside MS Office Docs Read More »

Tech Patrol

Fastest Spread Ransomware Attack In China’s History

A new interesting technique of ransom attached to a rapidly spreading ransomware attack in China is getting the world’s tech leaders attention as the infection has spread to more than 100,000 computers in the last four days as a result of a supply-chain attack. An impactful point is that the number of infected users is continuously growing …

Fastest Spread Ransomware Attack In China’s History Read More »

Tech Patrol

Email Security In An Age Of Ransomware and Phishing Attacks

There has been a rapid growth on the attention regarding Email security as the landscape around phishing campaigns that deliver ransomware continues to grow within’ organisational concerns. Recently, there has been no shortage of notable cyber attacks. The ‘I’m A Programmer Who Cracked Your Email’ Scam, is just one of the most recent email scams that not …

Email Security In An Age Of Ransomware and Phishing Attacks Read More »

Intel logo-Tech Patrol

New Intel CPU Flaw Leaves Millions Vulnerable

Security researches have found a new Intel CPU flaw that exploits Hyper-Threading to steal encrypted data which can allow hackers access to sensitive protected data, like cryptographic keys, passwords, from all other processes running in the same CPU core with simultaneous multi-threading feature enabled. Throughout this article, we will release the details of the flaw and show …

New Intel CPU Flaw Leaves Millions Vulnerable Read More »

BleedingBits Bluetooth Flaw - Vulnerability - Tech-Patrol

Critical Bluetooth Vulnerability Exposes Millions Of Devices

Security researchers from Israeli security firm Armis, have unveiled details of two critical vulnerabilities in Bluetooth’s Low Energy Chips (BLE) that are embedded in millions of access points and networking devices used by enterprises around the world. Throughout this article, we will look to bring light into the situation to make sure that you’re better …

Critical Bluetooth Vulnerability Exposes Millions Of Devices Read More »

Drupal-vulnerability-Tech-Patrol

Critical RCE Bug Patches for Drupal 7 and 8

Drupal, a content management software platform that is used to make loads of business websites and applications is urging users to upgrade to the latest release that looks to patch 2 critical remote code execution bugs impacting Drupal 7 and Drupal 8. It doesn’t just stop there, developers have also uncovered three additional “moderately critical” …

Critical RCE Bug Patches for Drupal 7 and 8 Read More »

SSH-terminal-Tech-Patrol

LibSSH Server Flaw Allows Hackers Access Without Password

Libssh is a four-year-old vulnerability that allows anyone to completely bypass authentication and gain unfettered administrative control over a vulnerable server without requiring a password. We thought that this was dead however it has now been discovered in the Secure Shell (SSH) implementation library. Peter Winter-Smith form NCC Group discovered a security bug Tracked as …

LibSSH Server Flaw Allows Hackers Access Without Password Read More »

threat-tech-success
Scroll to Top