Blog
Featured
Latest posts

Critical vulnerabilities in Solarwind's software - enables several different attacks
Several products in Solarwind's Orion program have been affected by a supply chain attack that has led to data theft. Hackers planted back door in the software A supply chain attack aims to infiltrate some ...
Read More
Read More

Ransomware uses new tricks - exposes companies to greater danger
The hostage program Maze Ransomware shows that it is possible for attackers to hide in the network, without the victim knowing about it. After the attack, attackers can remain - hidden in ...
Read More
Read More

Billions of devices vulnerable to Wi-Fi encryption
A new vulnerability that goes by the name of "kr00k" poses a risk to billions of network devices. A form of man-in-the-middle attack can be used to intercept parts of network packets. Network devices over ...
Read More
Read More

Famous companies exposed to new phishing campaign - Trojan hidden in sent files
A new phishing campaign has hit more companies, including some that have operations in Sweden. Attachments named after the victim's company can become a gateway for attackers. Activities in ...
Read More
Read More

Microsoft Azure suffers from new vulnerabilities - allows for targeted attacks on companies
Two serious vulnerabilities have been found in Microsoft Azure, which could compromise the Azure server. Utilizing these could lead to Microsoft Azure corporate customers being exposed to targeted ...
Read More
Read More
Book a free consultation
Current offer!
Get the first penetration test for half the price when you book a consultation before the end of the year!
We protect your privacy. No contact information will be shared with external parties. Read our security policy.

Critical vulnerabilities in Solarwind's software - enables several different attacks
Several products in Solarwind's Orion program have been affected by a supply chain attack that has led to data theft. Hackers planted back door in ...
Read More
Read More

Ransomware uses new tricks - exposes companies to greater danger
The hostage program Maze Ransomware shows that it is possible for attackers to hide in the network, without the victim knowing ...
Read More
Read More

Billions of devices vulnerable to Wi-Fi encryption
A new vulnerability that goes by the name of "kr00k" poses a risk to billions of network devices. A form of man-in-the middle attack ...
Read More
Read More
Made with in Karlskrona, Sweden
2021 CYPRO AB. All rights reserved