The National Security Agency is sharing new guidance to help organizations limit an adversary’s movement on the internal network by adopting zero-trust framework principles. […]
Category Added in a WPeMatico Campaign
Apple fixes two new iOS zero-days exploited in attacks on iPhones
Apple released emergency security updates to fix two iOS zero-day vulnerabilities that were exploited in attacks on iPhones. […]
New WogRAT malware abuses online notepad service to store malware
A new malware dubbed ‘WogRAT’ targets both Windows and Linux in attacks abusing an online notepad platform named ‘aNotepad’ as a covert channel for storing and retrieving malicious code. […]
Microsoft is killing off the Android apps in Windows 11 feature
Microsoft has unexpectedly announced they are ending support for the Windows Subsystem for Android next year on March 5th. […]
U.S. sanctions Predator spyware operators for spying on Americans
The U.S. has imposed sanctions on two individuals and five entities linked to the development and distribution of the Predator commercial spyware used to target Americans, including government officials and journalists. […]
Hackers abuse QEMU to covertly tunnel network traffic in cyberattacks
Malicious actors were detected abusing the open-source hypervisor platform QEMU as a tunneling tool in a cyberattack against a large company. […]
Facebook and Instagram outage logs out users, passwords not working
Facebook and Instagram users worldwide have been logged out of the sites and are having trouble logging in, receiving errors that their passwords are incorrect. […]
BlackCat ransomware shuts down in exit scam, blames the “feds”
The BlackCat ransomware gang is pulling an exit scam, trying to shut down and run off with affiliates’ money by pretending the FBI seized their site and infrastructure. […]
Passwords are Costing Your Organization Money – How to Minimize Those Costs
Getting rid of passwords completely isn’t a realistic option for most orgs, but there are things you can do to make them more secure. Learn more from Specops Software on maximizing security while mitigating costs. […]
Exploit available for new critical TeamCity auth bypass bug, patch now
A critical vulnerability (CVE-2024-27198) in the TeamCity On-Premises CI/CD solution from JetBrains can let a remote unauthenticated attacker take control of the server with administrative permissions. […]
