0,00 
0
0
Subtotal: 0,00 
No products in the basket.
0,00 
0
0
Subtotal: 0,00 
No products in the basket.
ascend_fairness-logo
ascend_ekahau-reseller-partner-badge
Ruckus Commscope logo with dog symbol.
Peplink Certified Gold Partner Logo

April 2024

Millions of Malicious 'Imageless' Containers Planted on Docker Hub Over 5 Years

Cybersecurity researchers have discovered multiple campaigns targeting Docker Hub by planting millions of malicious "imageless" containers over the past five years, once again underscoring how open-source registries could pave the way for supply chain attacks. "Over four million of the repositories in Docker Hub are imageless and have no content except for the repository

Millions of Malicious 'Imageless' Containers Planted on Docker Hub Over 5 Years Read More »

Christian Heckel from Ascend GmbH acquires the certificate as "Certified Ruckus Partner"

Ruckus Commscope logo with dog symbol.

Ascend GmbH, a leading provider of Ekahau and WLAN solutions, is pleased to announce that our Managing Director, Christian Heckel, has successfully obtained the "Certified Ruckus Partner" certificate. This new qualification reinforces our commitment to excellent network solutions and customer service. Christian Heckel, who is already a recognized expert in the field of Ekahau and

Christian Heckel from Ascend GmbH acquires the certificate as "Certified Ruckus Partner" Read More »

Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw

Cybersecurity researchers have discovered a targeted operation against Ukraine that has been found leveraging a nearly seven-year-old flaw in Microsoft Office to deliver Cobalt Strike on compromised systems. The attack chain, which took place at the end of 2023 according to Deep Instinct, employs a PowerPoint slideshow file ("signal-2023-12-20-160512.ppsx") as the starting point, with

Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw Read More »

Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks

Identity and access management (IAM) services provider Okta has warned of a spike in the "frequency and scale" of credential stuffing attacks aimed at online services. These unprecedented attacks, observed over the last month, are said to be facilitated by "the broad availability of residential proxy services, lists of previously stolen credentials ('combo lists'), and

Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks Read More »

Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover

Multiple critical security flaws have been disclosed in the Judge0 open-source online code execution system that could be exploited to obtain code execution on the target system. The three flaws, all critical in nature, allow an "adversary with sufficient access to perform a sandbox escape and obtain root permissions on the host machine," Australian

Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover Read More »

New R Programming Vulnerability Exposes Projects to Supply Chain Attacks

A security vulnerability has been discovered in the R programming language that could be exploited by a threat actor to create a malicious RDS (R Data Serialization) file such that it results in code execution when loaded and referenced. The flaw, assigned the CVE identifier CVE-2024-27322 (CVSS score: 8.8), "involves the use of promise objects and lazy

New R Programming Vulnerability Exposes Projects to Supply Chain Attacks Read More »

Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM

It comes as no surprise that today's cyber threats are orders of magnitude more complex than those of the past. And the ever-evolving tactics that attackers use demand the adoption of better, more holistic and consolidated ways to meet this non-stop challenge. Security teams constantly look for ways to reduce risk while improving security posture, but many

Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM Read More »

China-Linked 'Muddling Meerkat' Hijacks DNS to Map Internet on Global Scale

A previously undocumented cyber threat dubbed Muddling Meerkat has been observed undertaking sophisticated domain name system (DNS) activities in a likely effort to evade security measures and conduct reconnaissance of networks across the world since October 2019. Cloud security firm Infoblox described the threat actor as likely affiliated with the

China-Linked 'Muddling Meerkat' Hijacks DNS to Map Internet on Global Scale Read More »