Multiple 7-Zip Vulnerabilities Discovered by Talos

By Talos Group 7-Zip is an open-source file archiving application which features optional AES-256 encryption, support for large files, and the ability to use “any compression, conversion or encryption method”. Recently Cisco Talos has discovered multiple exploitable vulnerabilities in 7-Zip. These type of vulnerabilities are especially concerning since vendors may not be aware they are […]

Multiple 7-Zip Vulnerabilities Discovered by Talos

By Talos Group 7-Zip is an open-source file archiving application which features optional AES-256 encryption, support for large files, and the ability to use “any compression, conversion or encryption method”. Recently Cisco Talos has discovered multiple exploitable vulnerabilities in 7-Zip. These type of vulnerabilities are especially concerning since vendors may not be aware they are […]

Microsoft Patch Tuesday – May 2016

By Talos Group This post is authored by Holger Unterbrink. Patch Tuesday for May 2016 has arrived where Microsoft releases their monthly set of security bulletins designed to address security vulnerabilities within their products. This month’s release contains 16 bulletins addressing 33 vulnerabilities. Fourteen bulletins are rated critical, addressing vulnerabilities in Edge, Internet Explorer, Office, […]

Microsoft Patch Tuesday – May 2016

By Talos Group This post is authored by Holger Unterbrink. Patch Tuesday for May 2016 has arrived where Microsoft releases their monthly set of security bulletins designed to address security vulnerabilities within their products. This month’s release contains 16 bulletins addressing 33 vulnerabilities. Fourteen bulletins are rated critical, addressing vulnerabilities in Edge, Internet Explorer, Office, […]

BSI-Umfrage zur Betroffenheit durch Ransomware – 04/2016

BSI-Umfrage zur Betroffenheit durch Ransomware – 04/2016 Locky, Petja und Co. sind hinlänglich in allen Medien aufgegriffen worden. Neben einem Fraunhofer-Institut und einer Neusser Klinik waren auch viele Privatnutzer von einem Verschlüsselungstrojaner betroffen. Doch wie sieht die Lage im Unternehmensumfeld aus? Eine aktuelle Umfrage des BSI zeigt auf, dass etwa ein Drittel aller Unternehmen mit […]