Password reuse might seem like a small problem — but it can have far-reaching consequences for an organization’s cybersecurity. Learn more from Specops Software about what IT teams can do to combat the problem. […]
Category Added in a WPeMatico Campaign
Malicious Visual Studio projects on GitHub push Keyzetsu malware
Threat actors are abusing GitHub automation features and malicious Visual Studio projects to push a new variant of the “Keyzetsu” clipboard-hijacking malware and steal cryptocurrency payments. […]
Microsoft fixes two Windows zero-days exploited in malware attacks
Microsoft has fixed two actively exploited zero-day vulnerabilities during the April 2024 Patch Tuesday, although the company failed to initially tag them as such. […]
Critical Rust flaw enables Windows command injection attacks
Threat actors can exploit a security vulnerability in the Rust standard library to target Windows systems in command injection attacks. […]
Windows 10 KB5036892 update released with 23 new fixes, changes
Microsoft has released the KB5036892 cumulative update for Windows 10 21H2 and Windows 10 22H2 with twenty-three changes and two new features. […]
GHC-SCW: Ransomware gang stole health data of 533,000 people
Non-profit healthcare service provider Group Health Cooperative of South Central Wisconsin (GHC-SCW) has disclosed that a ransomware gang breached its network in January and stole documents containing the personal and medical information of over 500,000 individuals. […]
Windows 11 KB5036893 update released with 29 changes, Moment 5 features
Microsoft has released the KB5036893 cumulative update for Windows 11 23H3, which includes 29 changes and fixes and enables the Moment 5 features for every user. […]
Microsoft April 2024 Patch Tuesday fixes 150 security flaws, 67 RCEs
Today is Microsoft’s April 2024 Patch Tuesday, which includes security updates for 150 flaws and sixty-seven remote code execution bugs. […]
RUBYCARP hackers linked to 10-year-old cryptomining botnet
A Romanian botnet group named ‘RUBYCARP’ is leveraging known vulnerabilities and performing brute force attacks to breach corporate networks and compromise servers for financial gain. […]
Implementing container security best practices using Wazuh
Maintaining visibility into container hosts, ensuring best practices, and conducting vulnerability assessments are necessary to ensure effective security. In this article Wazuh explores how its software can help implement best security practices for containerized environments. […]
