In this publication, Check Point describes a technique which would have allowed a threat actor to potentially identify and join active meetings.
https://research.checkpoint.com/2020/zoom-zoom-we-are-watching-you/
In this publication, Check Point describes a technique which would have allowed a threat actor to potentially identify and join active meetings.
https://research.checkpoint.com/2020/zoom-zoom-we-are-watching-you/
Plugin in question: https://www.ultimatebeaver.com/
Vulnerable version: 2.8.4 and below
Learn more: https://wpvulndb.com/vulnerabilities/10051
Plugin in question: https://wordpress.org/plugins/code-snippets/
Vulnerable version: 2.13.3 and below
Learn more: https://wpvulndb.com/vulnerabilities/10050
Plugin in question: https://wordpress.org/plugins/wps-hide-login/
Vulnerable version: 1.5.4.2 and below
Learn more: https://blog.nintechnet.com/wordpress-wps-hide-login-fixed-security-issue/
Vulnerable version: 3.1.1 and below
Learn more: https://learndash.releasenotes.io/release/uCskc-version-312
Plugin in question: https://wordpress.org/plugins/wp-time-capsule/
Vulnerable version: 1.21.16 and below
Learn more: https://wpvulndb.com/vulnerabilities/10010
If you are still not aware from our previous notifications, Microsoft has now stopped all support for Windows 7 operating system.
WHat this means is that you will no longer receive any updates, or security patches from Microsoft. That is a huge no-no, and prevents a security risk to your device.
Learn more: https://www.microsoft.com/en-us/microsoft-365/windows/end-of-windows-7-support
Need help upgrading? Talk to us for a custom quote on assisting you with the upgrade to Windows 10. https://ctare.cloud/contact/
Plugin in question: https://codecanyon.net/item/ultimate-addons-for-visual-composer/6892199
Vulnerable version: 3.16.11 and below
Learn more: https://wpvulndb.com/vulnerabilities/8821
Vulnerable version: below 4.0.10
Learn more: https://us7.campaign-archive.com/?u=9ae7aa91c578052b052b864d6&id=e3532c8cb1
Cyber attacks are on the sharpest rise in the APAC region. And these articles shares why.
https://www.cio.com/article/3293060/the-biggest-data-breaches-in-the-asean-region.html