Microsoft Exchange 2013 and Newer Vulnerable to NTLM Relay Attacks | SAT News
Microsoft Exchange supports an API called, Exchange Web Services (EWS).
Remote Access Vulnerability in Cisco Small Business Switches | SAT News
Last week a vulnerability was discovered in Cisco devices, such as the Small Business 200 series which equips users with a default admin account and password.
Unprotected VOIP Server Exposes Millions of Call Logs and SMS Messages | SAT News
A California-based Voice-Over IP (VOIP) services provider has accidentally left tens of gigabytes of its customer data, containing millions of call logs, SMS/MMS messages, and plaintext internal system credentials, publicly...
Hackers Using Zero-Width Spaces to Bypass Office 365 | SAT News
A new technique is currently being used in order to bypass a security feature in Microsoft Office 365 called Safe Links.
New Year Security Reminder | SAT News
Many consumers received internet-connected devices, new computers, phones, tablets, smart appliances and wearable tech as gifts this holiday season and toys will come online as December ends and January begins....
Spam Bomb Threat Demanding Bitcoin Ransom Payments | SAT News
A new spam email extortion scam is making its way around the web, threatening businesses and schools nationwide saying that someone has planted bombs within the building and will be...
Starwood Hotels Massive Database Breach Affecting 500 Million Guests | SAT News
Starwood Hotels and Resorts, a subsidiary of Marriott, has announced that their reservation database has been breached and personal information of approximately 500 million guests was obtained.
How to Choose the Right Managed Security Service Provider (MSSP) for Your Organization
By Martha Vazquez, Senior Research Analyst at IDC Organizations are reaching a pivotal time where attacks and threats are becoming more prominent due to an increase in the attack surface.
Critical Vulnerabilities found in Cisco, Meraki, and Aruba devices | SAT News
A set of vulnerabilities named “BleedingBit” allow remote attackers to exploit Bluetooth Low Energy (BLE) chips created by Texas Instruments are being utilized in millions of access points and networking...