Open Mon - Fri: 9:00AM to 5:30PM

Category

Blog

Matrix has slowly evolved into a ‘Swiss Army knife’ of the ransomware world

The Matrix ransomware is usually deployed after cyber-criminals use unsecured RDP endpoints to compromise companies’ internal networks. Matrix, a ransomware strain first seen in late 2016, has evolved into a dangerous threat after years of...
Read More

Microsoft Exchange vulnerable to ‘PrivExchange’ zero-day

Proof-of-concept tool lets attackers escalate a hacked inbox to admin on a company’s internal domain controller. Microsoft Exchange 2013 and newer are vulnerable to a zero-day named “PrivExchange” that allows a remote attacker with just...
Read More
Meltdown Spectre

Meltdown and Spectre FAQ: How the critical CPU flaws affect PCs and Macs

Massive security vulnerabilities in modern CPUs are forcing a redesign of the kernel software at the heart of all major operating systems. Since the issues—dubbed Meltdown and Spectre—exist in the CPU hardware itself, Windows, Linux,...
Read More