Mitigate, Xyone’s internal security monitoring and GCHQ-certified training delivery package, has been accepted for listing on the UK Government’s G-Cloud 11 framework.
Xyone Cyber Security co-hosted an exective roundtable to discuss pressing cyber security concerns on June 13th in Manchester, alongside IT service provider summ.it and insurance broker A&B. Attending were subject matter experts such as Det Ch Supt Neil J. Jones, Police Lead at the Manchester Digital Security Centre, alongside SME owners and IT professionals representing sectors ranging from legal to retail.
Please ensure that all Internet-facing devices running vulnerable Windows OS versions are fully-up-to-date.
Event details When: 24 –25 April 2019 Where: Scottish Event Campus, Glasgow CYBERUK is the UK government’s flagship cyber security event. Hosted by the National Cyber Security Centre (NCSC), it features world-class speakers, solutions and opportunities for interaction between the public and private sectors. You will be briefed on the evolving cyber threat and how we must […]
A critical vulnerability in all but the most-recent WordPress versions has been revealed by security firm RIPS Tech. The vulnerability allows an unauthenticated attacker to hijack a logged-in administrator’s account to run arbitrary code on the target site. RIPS Tech report that ‘the vulnerabilit[y] exist[s] in WordPress versions prior to 5.1.1 and is exploitable with […]
Cloud computing and software company Citrix have recently been the victim of a major cyber attack, with attackers gaining access to what cyber security firm Resecurity claims is ‘at least 6 terabytes of sensitive data stored in the Citrix enterprise network, including e-mail correspondence, files in network shares and other services used for project management and procurement.’
A critical update for the Google Chrome Web browser was released at the start of March. Details of the zero-day vulnerability that the update fixes are currently still restricted ‘until a majority of users are updated with a fix’, but it appears to grant an attacker the ability to execute malicious code on a victim’s […]
Transport Layer Security version 1.3, which was finally approved for use in August of last year and hailed as ‘mak[ing] all secure internet connections faster and safer’ has been found to be vulnerable, allowing attackers to break the security offered and read private Internet traffic.