Microsoft has warned that attackers are already taking advantage of recently disclosed zero-day exploits to hack into victim’s networks and steal data, and more attacks are likely on the way. The two new zero-day vulnerabilities in Microsoft Exchange Server (CVE-2022-41040 and CVE-2022-41082) were detailed last week, with warnings that they could allow hackers to remotely gain […]
The most common victims targeted work at organisations that weren’t using multi-factor authentication (MFA) to secure their accounts. Business Email Compromise (BEC) attacks are one of the most lucrative forms of cyber crime: According to the FBI, the combined total lost is over $43 billion and counting, with attacks in at least 177 countries. These attacks […]
Cloud applications and software have become a key part of everyday life for employees and businesses. Enhance your cyber security awareness to avoid simple errors that can make your cloud an easy target for hackers. The popularity of cloud applications and software has risen significantly in recent years, and while using cloud services can be beneficial […]
Microsoft rolls out a new security feature that should significantly slow down password attacks against Windows devices.The latest preview of Windows 11 ships with the SMB server authentication rate limiter on by default. This makes Windows 11″a very unattractive target” for hackers trying to steal credentials, since it’s much more time-consuming for them to target […]
A stealthy new form of malware is targeting Linux systems in attacks that can take full control of infected devices, and use this access to install crypto-mining malware. This malware has been detailed by cybersecurity researchers at AT&T Alien Labs, they call it Shikitega. This malware targets endpoints and Internet of Things devices that run on Linux operating […]
Targets of ransomware rarely publicly acknowledge attacks. More openness would help everyone. Ransomware is one of the most significant cybersecurity issues we face, as cyber criminals hack into businesses, schools, hospitals, critical infrastructure and more, in order to encrypt files and demand a ransom payment for the decryption key. Despite warnings not to, many victims pay […]
Even if you don’t want iOS 16 yet, updating to iOS 15.7 is still a very good idea to fix security flaws. The iOS 16 update became available on September 12th for the iPhone 8 and newer, changing just about every app or screen of the mobile operating system. Apple iOS/iPadOS 15 and macOS Big […]
Google Chrome users on Windows, Mac, and Linux need to install the latest update to the browser to protect themselves from a serious security vulnerability that hackers are actively exploiting. “Google is aware of reports that an exploit for CVE-2022-3075 exists in the wild,” the company said in a September 2nd blog post. An anonymous tipster reported […]
A vulnerability in the TikTok app for Android could have let attackers take over any account that clicked on a malicious link, potentially affecting hundreds of millions of users of the platform. Details of the one-click exploit were revealed in a blog post from researchers on Microsoft’s 365 Defender Research Team. The vulnerability was disclosed to TikTok […]