SirCam worm slithers through inboxes

SirCam worm slithers through inboxes

When it comes to use of social engineering in malware, the SirCam worm must be among the most insidious. The worm propagated itself in the usual way via email attachment. But SirCam didn’t carry a new email attachment—the typical “invoice” or “delivery confirmation” PDF.
IoT is exposing networks to cybersecurity vulnerabilities

IoT is exposing networks to cybersecurity vulnerabilities

Businesses that have been fortifying their computers against ransomware and other threats could be overlooking additional vulnerabilities within their ecosystem. IoT could be at risk.
How System Vulnerabilities Occur - Microsoft "PrintNightmare" Exploit

How System Vulnerabilities Occur - Microsoft "PrintNightmare" Exploit

What is a vulnerability? A system vulnerability is a flaw in the design of an operating system, application, or device that can be exploited by malicious entities to gain access and control of your system
CVE-2021-30116: Multiple Zero-Day Vulnerabilities in Kaseya VSA Exploited to Distribute REvil Ransomware

CVE-2021-30116: Multiple Zero-Day Vulnerabilities in Kaseya VSA Exploited to Distribute REvil Ransomware

Zero-day vulnerabilities in popular remote monitoring and management software targeted by threat actors to distribute ransomware to reportedly over one million systems.
Hackers Exploit Fortinet Flaw in Sophisticated Cring Ransomware Attacks

Hackers Exploit Fortinet Flaw in Sophisticated Cring Ransomware Attacks

Hackers Exploit Fortinet Flaw - Industrial enterprises in Europe are target of campaign, which forced a shutdown of industrial processes in at least one of its victims’ networks, according to researchers.
Popular password manager in the spotlight over web trackers

Popular password manager in the spotlight over web trackers

MS Exchange servers under siege from at least 10 APT groups

MS Exchange servers under siege from at least 10 APT groups

Facebook Messenger Bug Allows Spying on Android Users

Facebook Messenger Bug Allows Spying on Android Users

The company patched a vulnerability that could connected video and audio calls without the knowledge of the person receiving them.
Domains impersonating news sites emerge as cybersecurity threat

Domains impersonating news sites emerge as cybersecurity threat

SmarterMSP has highlighted the recent danger of malware and ransomware coming into email boxes tied to news of the day. An example might be an email appeal for funds related to post-election legal action or rebuilding after California’s wildfires.
microsoft-outlook-crashing-0xc0000005-errors

microsoft-outlook-crashing-0xc0000005-errors

Yet another software update fail has been unleashed by Microsoft, and this time it appears that the updates have ended up breaking Outlook with 0xc0000005 error
Apple surveys customers on old chargers amid rumors iPhone 12 won’t include one

Apple surveys customers on old chargers amid rumors iPhone 12 won’t include one

Is Apple really going to stop including the power adapter in-box for your brand new iPhone?
Twitter apologizes to clients for data breach

Twitter apologizes to clients for data breach

Twitter has issued an apology to its business clients acknowledging that personal information may have been compromised
Passwords are no longer a secure method of identity verification

Passwords are no longer a secure method of identity verification

Passwords have been a staple for account identity verification for years, but with passwords continually reused or becoming easier to guess, users are realizing how vulnerable the tactic can be.
5 emerging security technologies set to level the battlefield

5 emerging security technologies set to level the battlefield

The war between data defenders and data thieves has been described as a cat-and-mouse game. How can the playing field be tilted in favor of the info-sec warriors? Here are five emerging security technologies that may be able to do that.
Share:

Related Posts