Microsoft Security Warning: This malware creates a 'persistent' backdoor for hackers

Microsoft Security Warning: This malware creates a 'persistent' backdoor for hackers

This custom backdoor lets attackers remotely steal tokens and certificates from Microsoft's identity platform.
VMware vCenter Server Vulnerability CVE-2021-22005 Under Active Exploit

VMware vCenter Server Vulnerability CVE-2021-22005 Under Active Exploit

A complete exploit for the remote code execution vulnerability in VMware vCenter tracked as CVE-2021-22005 is now widely available, and threat actors are taking advantage of it.
Apple Issues Emergency Security Updates To Close Spyware Flaw

Apple Issues Emergency Security Updates To Close Spyware Flaw

Apple released a critical software patch to fix a security vulnerability that researchers said could allow hackers to directly infect iPhones and other Apple devices without any user action.
Virtualization is the Future - Automate and Manage your Network

Virtualization is the Future - Automate and Manage your Network

Virtualization has been topping the list of buzzwords in 2021. It's a method that allows you to run multiple operating systems on one physical machine to keep your hardware costs down.
SirCam worm slithers through inboxes

SirCam worm slithers through inboxes

When it comes to use of social engineering in malware, the SirCam worm must be among the most insidious. The worm propagated itself in the usual way via email attachment. But SirCam didn’t carry a new email attachment—the typical “invoice” or “delivery confirmation” PDF.
IoT is exposing networks to cybersecurity vulnerabilities

IoT is exposing networks to cybersecurity vulnerabilities

Businesses that have been fortifying their computers against ransomware and other threats could be overlooking additional vulnerabilities within their ecosystem. IoT could be at risk.
How System Vulnerabilities Occur - Microsoft "PrintNightmare" Exploit

How System Vulnerabilities Occur - Microsoft "PrintNightmare" Exploit

What is a vulnerability? A system vulnerability is a flaw in the design of an operating system, application, or device that can be exploited by malicious entities to gain access and control of your system
CVE-2021-30116: Multiple Zero-Day Vulnerabilities in Kaseya VSA Exploited to Distribute REvil Ransomware

CVE-2021-30116: Multiple Zero-Day Vulnerabilities in Kaseya VSA Exploited to Distribute REvil Ransomware

Zero-day vulnerabilities in popular remote monitoring and management software targeted by threat actors to distribute ransomware to reportedly over one million systems.
Hackers Exploit Fortinet Flaw in Sophisticated Cring Ransomware Attacks

Hackers Exploit Fortinet Flaw in Sophisticated Cring Ransomware Attacks

Hackers Exploit Fortinet Flaw - Industrial enterprises in Europe are target of campaign, which forced a shutdown of industrial processes in at least one of its victims’ networks, according to researchers.
Popular password manager in the spotlight over web trackers

Popular password manager in the spotlight over web trackers

MS Exchange servers under siege from at least 10 APT groups

MS Exchange servers under siege from at least 10 APT groups

Facebook Messenger Bug Allows Spying on Android Users

Facebook Messenger Bug Allows Spying on Android Users

The company patched a vulnerability that could connected video and audio calls without the knowledge of the person receiving them.
Domains impersonating news sites emerge as cybersecurity threat

Domains impersonating news sites emerge as cybersecurity threat

SmarterMSP has highlighted the recent danger of malware and ransomware coming into email boxes tied to news of the day. An example might be an email appeal for funds related to post-election legal action or rebuilding after California’s wildfires.
microsoft-outlook-crashing-0xc0000005-errors

microsoft-outlook-crashing-0xc0000005-errors

Yet another software update fail has been unleashed by Microsoft, and this time it appears that the updates have ended up breaking Outlook with 0xc0000005 error
Apple surveys customers on old chargers amid rumors iPhone 12 won’t include one

Apple surveys customers on old chargers amid rumors iPhone 12 won’t include one

Is Apple really going to stop including the power adapter in-box for your brand new iPhone?
Twitter apologizes to clients for data breach

Twitter apologizes to clients for data breach

Twitter has issued an apology to its business clients acknowledging that personal information may have been compromised
Passwords are no longer a secure method of identity verification

Passwords are no longer a secure method of identity verification

Passwords have been a staple for account identity verification for years, but with passwords continually reused or becoming easier to guess, users are realizing how vulnerable the tactic can be.
5 emerging security technologies set to level the battlefield

5 emerging security technologies set to level the battlefield

The war between data defenders and data thieves has been described as a cat-and-mouse game. How can the playing field be tilted in favor of the info-sec warriors? Here are five emerging security technologies that may be able to do that.
Share:

Related Posts