Hacking Microsoft teams by simply using a GIF image
As the use of video conferencing platforms for home work increases, the battle between big tech companies continues to seek to seize a market that was badly exploited before theRead More →
As the use of video conferencing platforms for home work increases, the battle between big tech companies continues to seek to seize a market that was badly exploited before theRead More →
One of the most notable behaviors during the weeks of social estrangement and work from home has been the use of remote communication tools, such as the Zoom video conferencingRead More →
Last week, the web application penetration testing team at cybersecurity solutions firm Sophos received a report on an XG Firewall implementation that presented a visible suspicious value in the managementRead More →
IT security services specialists reported the finding of a new flaw based on the use of special characters affecting Apple devices. The report, published on the MacRumors platform, mentions thatRead More →
Recently, hundreds of Nintendo console users reported various signs of suspicious activity on their accounts through social media. According to network perimeter security experts, these alleged attackers entered users’ accountsRead More →
A few days ago, multiple technology companies, such as Google, SpaceX, and even NASA banned their employees from using Zoom as a tool for remote work due to multiple reportsRead More →
Experts in IT security services from Cymulate, the only cyber attack simulation platform, recently announced the discovery of a method that would allow threat actors to execute malicious code throughRead More →
Social distancing due to coronavirus is generating unimaginable cybersecurity consequences, computer forensics experts say. One example is the UK, which is entering its fourth week of isolation, so thousands ofRead More →
Isolated systems and devices (known as “air-gapped” systems) have been the subject of analysis by researchers and threat actors for years, as network perimeter security specialists said, which has generatedRead More →
Sometimes, security bug fixes create other system issues that should improve. Experts in vulnerability assessment mentioned that a Windows 10 kernel flaw allows you to bypass the system sandbox, whichRead More →