What’s behind the record‑high number of zero days?
Organizations need to get better at mitigating threats from unknown vulnerabilities, especially as both state-backed operatives and financially-motivated cybercriminals are increasing their activity The post What’s behind the record‑high number of zero days? appeared first on WeLiveSecurity
What every business leader needs to know about Log4Shell
Hundreds of thousands of attempts to exploit the vulnerability are under way The post What every business leader needs to know about Log4Shell appeared first on WeLiveSecurity
Log4Shell vulnerability: What we know so far
The critical flaw in the ubiquitous Log4j utility has sent shockwaves far beyond the security industry – here’s what we know so far The post Log4Shell vulnerability: What we know so far appeared first on WeLiveSecurity
Hackers could force locked iPhones to make contactless payments
Flaws in Apple Pay and Visa could allow criminals to make arbitrary contactless payments – no authentication needed, research finds The post Hackers could force locked iPhones to make contactless payments appeared first on WeLiveSecurity
Google releases emergency fix to plug zero‑day hole in Chrome
The emergency release comes a mere three days after Google’s previous update that plugged another 19 security loopholes The post Google releases emergency fix to plug zero‑day hole in Chrome appeared first on WeLiveSecurity
Bug in macOS Finder allows remote code execution
While Apple did issue a patch for the vulnerability, it seems that the fix can be easily circumvented The post Bug in macOS Finder allows remote code execution appeared first on WeLiveSecurity
Microsoft Patch Tuesday fixes actively exploited zero‑day and 85 other flaws
The most recent Patch Tuesday includes a fix for the previously disclosed and actively exploited remote code execution flaw in MSHTML. The post Microsoft Patch Tuesday fixes actively exploited zero‑day and 85 other flaws appeared first on WeLiveSecurity
Cybersecurity agencies reveal most exploited vulnerabilities in the past two years
There are 30 vulnerabilities listed in total; organizations would do well to patch their systems if they haven’t done so yet The post Cybersecurity agencies reveal most exploited vulnerabilities in the past two years appeared first on WeLiveSecurity
Popular Wi‑Fi routers still using default passwords making them susceptible to attacks
To mitigate the chances of their Wi-Fi home routers being compromised, users would do well to change the manufacturer’s default access credentials The post Popular Wi‑Fi routers still using default passwords making them susceptible to attacks appeared first on WeLiveSecurity