Select Page

Blog

Featured

Latest posts

Critical vulnerabilities in Solarwind's software - enables several different attacks

Several products in Solarwind's Orion program have been affected by a supply chain attack that has led to data theft. Hackers planted back door in the software A supply chain attack aims to infiltrate some ...
Read More

Ransomware uses new tricks - exposes companies to greater danger

The hostage program Maze Ransomware shows that it is possible for attackers to hide in the network, without the victim knowing about it. After the attack, attackers can remain - hidden in ...
Read More
network interception

Billions of devices vulnerable to Wi-Fi encryption

A new vulnerability that goes by the name of "kr00k" poses a risk to billions of network devices. A form of man-in-the-middle attack can be used to intercept parts of network packets. Network devices over ...
Read More
phishinh attack

Famous companies exposed to new phishing campaign - Trojan hidden in sent files

A new phishing campaign has hit more companies, including some that have operations in Sweden. Attachments named after the victim's company can become a gateway for attackers. Activities in ...
Read More
Microsoft Azure logo

Microsoft Azure suffers from new vulnerabilities - allows for targeted attacks on companies

Two serious vulnerabilities have been found in Microsoft Azure, which could compromise the Azure server. Utilizing these could lead to Microsoft Azure corporate customers being exposed to targeted ...
Read More
Loading ...

Book a free consultation

Current offer!
Get the first penetration test for half the price when you book a consultation before the end of the year!

 

 

We protect your privacy. No contact information will be shared with external parties. Read our security policy.

Critical vulnerabilities in Solarwind's software - enables several different attacks

Several products in Solarwind's Orion program have been affected by a supply chain attack that has led to data theft. Hackers planted back door in ...
Read More

Ransomware uses new tricks - exposes companies to greater danger

The hostage program Maze Ransomware shows that it is possible for attackers to hide in the network, without the victim knowing ...
Read More
network interception

Billions of devices vulnerable to Wi-Fi encryption

A new vulnerability that goes by the name of "kr00k" poses a risk to billions of network devices. A form of man-in-the middle attack ...
Read More

Made with    in Karlskrona, Sweden

2021 CYPRO AB. All rights reserved