by Ludwig Wideskär | Jun 26, 2020 | Newsletters
The Maze Ransomware hostage program shows that it is possible for attackers to hide in the network without the victim knowing. After the attack, attackers can remain - hidden in the network Hostage program (ransomware) is a constant threat to companies ...
by Ludwig Wideskär | March 6, 2020 | Newsletters
A new vulnerability known as 'kr00k' poses a risk to billions of network devices. A form of man-in-the-middle attack can be used to eavesdrop on parts of network packets. Network devices around the world are at risk A new vulnerability has ...
by Ludwig Wideskär | February 21, 2020 | Newsletters
A new phishing campaign has affected more companies, including some that have operations in Sweden. Attachments named after the victim's company can be a gateway for attackers. Operations in Sweden have been hit A new phishing campaign that targets ...
by Ludwig Wideskär | February 7, 2020 | Newsletters
Two serious vulnerabilities have been identified in Microsoft Azure, which could put the Azure server at risk. Exploitation can lead to the risk of targeted attacks by Microsoft Azure's corporate customers. Several vulnerabilities were found in Microsoft ...
by Ludwig Wideskär | January 31, 2017 | Newsletters
A critical vulnerability has been detected in several different Windows operating systems. Vulnerability can be exploited to falsify certificates and prevent malware from being detected during installation. Several Windows operating systems are vulnerable Recently, the NSA released ...
by Ludwig Wideskär | January 31, 2017 | Newsletters
Older versions of the Pulse Secure VPN VPN software have a vulnerability that could allow hackers to take control of the system. Hackers have now managed to use this to spread hostage programs at companies. Companies at risk using Pulse Secure VPN Vulnerability ...