Microsoft Office Excel – Security Feature Bypass Description: To exploit the vulnerability, an attacker would have to convince a user to open a specially crafted file with an affected version of Microsoft Office software. Threat: A security feature bypass...
Security breaches can happen at any time, but the holiday seasons have proven to be a time when successful attacks can peak for several reasons, mostly because companies relax their guard during the period. Both office staff and hackers alike are happy on holidays,...
Mozilla Firefox – Memory Safety Bugs Description: Multiple memory safety bugs fixed in Firefox 70 and Firefox ESR 68.2. Threat: An attacker who exploited the vulnerability could potentially be able to execute arbitrary code in the browser of victims....
As the demand for better access to cloud applications and data continues to gain traction, it is increasingly difficult for businesses to rely on existing Wide Area Networks. WANs connect enterprises to their branch offices and data centres over large geographic...
Artificial Intelligence (AI) is not anything new in the world of business. This branch of technology emphasises the development of computer systems that simulate human intelligence to perform various tasks that enhance and streamline business operations. Computer...