Attackers are leveraging Follina. What can you do?
As the world is waiting for Microsoft to push out a patch for CVE-2022-30190, aka “Follina”, attackers around the world are exploiting the vulnerability in a variety of campaigns. A complex vulnerability Microsoft has described CVE-2022-3.....»»
Why schoolchildren are regularly being targeted by terrorist groups in many countries
An Islamic State-linked group in Uganda attacked a school in June, killing more than 40 people, mostly students, in what seems to be an escalating trend of terrorism against schools. The attackers set fire to school dormitories and used machetes to k.....»»
Global rise in DDoS attacks threatens digital infrastructure
In 2022, the total number of DDoS attacks worldwide increased by 115.1% over the amount observed in 2021, according to Nexusguard. The data also showed that cyber attackers continued to alter their threat vectors by targeting the application platform.....»»
Tempo leverages the power of the iPhone and AI for its largest update ever
Connected fitness company Tempo is releasing its largest update ever today. An almost overwhelming amount of new features, customization, and data tracking have been added, leveraging the tech of the iPhone and AI. In fact, this feels less like an u.....»»
Uncovering attacker tactics through cloud honeypots
Attackers typically find exposed “secrets” – pieces of sensitive information that allow access to an enterprise cloud environment — in as little as two minutes and, in many cases, begin exploiting them almost instantly, highlighting the u.....»»
Microsoft Teams vulnerability allows attackers to deliver malware to employees
Security researchers have uncovered a bug that could allow attackers to deliver malware directly into employees’ Microsoft Teams inbox. “Organisations that use Microsoft Teams inherit Microsoft’s default configuration which allows users.....»»
How to create custom Apple Fitness+ plans with iOS 17
Getting specific and putting commitments on a calendar are two great ways to build consistency in working toward goals. With iOS 17 and watchOS 10, Apple is leveraging both of those tactics to help you get healthier with the ability to make custom A.....»»
Compromised Linux SSH servers engage in DDoS attacks, cryptomining
Poorly managed Linux SSH servers are getting compromised by unknown attackers and instructed to engage in DDoS attacks while simultaneously mining cryptocurrency in the background. The Tsunami DDoS bot Tsunami, also known as Kaiten, is a type of DDoS.....»»
Cybercriminals return to business as usual in a post-pandemic world
After two years of pandemic-induced disruption, 2022 was a return to business as usual for the world’s cybercriminals, according to Proofpoint. As COVID-19 medical and economic programs began to wind down, attackers had to find new ways to make a l.....»»
June 2023 Patch Tuesday: Critical patches for Microsoft Windows, SharePoint, Exchange
For June 2023 Patch Tuesday, Microsoft has delivered 70 new patches but, for once, none of the fixed vulnerabilities are currently exploited by attackers nor were publicly known before today! Microsoft has previously fixed CVE-2023-3079, a type confu.....»»
The multiplying impact of BEC attacks
The 2023 Verizon Data Breach Investigations Report (DBIR) has confirmed what FBI’s Internet Crime Complaint Center has pointed out earlier this year: BEC scammers are ramping up their social engineering efforts to great success. BEC attackers t.....»»
Exploring the Power of Tracker Applications on Android: Leveraging the Linux Foundation
Welcome to the world of tracker applications on the Android operating system. A tracker application, in its simplest form, is a software program designed to monitor and track specific activities or data on a device. In this article, we will delve i.....»»
How ‘Diablo IV’ evolved into the darkest ‘Diablo’ yet
How one of the biggest franchises in gaming is leveraging design to evolve. The year is 1996. The biggest TV show is ER. The biggest website is AOL.com. And Independence Day will top Twister to win the box office.Read Full Story.....»»
Why attackers love to target IoT devices
Operations technology endpoints lack security. Four reasons IoT devices are such a high-value target for malware and ransomware attacks . Operations technology endpoints lack security. Four reasons IoT devices are such a high-value target for mal.....»»
Exploited zero-day patched in Chrome (CVE-2023-3079)
Google has fixed a high-severity vulnerability in the Chrome browser (CVE-2023-3079) that is being exploited by attackers. About the vulnerability CVE-2023-3079 is a vulnerability that stems from a type confusion in the V8 JavaScript engine, and has.....»»
BlackBerry and Upstream Security join forces to protect software-defined vehicles
BlackBerry announced a partnership with Upstream Security to enable automakers to strengthen the overall security posture of their vehicles, by leveraging the rich telemetry data and edge compute capabilities from BlackBerry IVY. Upstream’s clo.....»»
MOVEit Transfer zero-day was exploited by Cl0p gang (CVE-2023-34362)
The zero-day vulnerability attackers have exploited to compromise vulnerable Progress Software’s MOVEit Transfer installations finally has an identification number: CVE-2023-34362. Based on information shared by Mandiant, Rapid7 and other security.....»»
MOVEit Transfer zero-day attacks: The latest info
There’s new information about the zero-day vulnerability in Progress Software’s MOVEit Transfer solution exploited by attackers and – more importantly – patches and helpful instructions for customers. The MOVEit Transfer zero-day.....»»
Apple is accelerating hiring efforts for generative AI engineers
Apple is again recruiting for Machine Learning engineers for both Apple AR and "Conversational and Generative AI."Apple is hiring AI engineers with AR experienceFor a company that is accused of being behind on AI because it isn't publicly leveraging.....»»
Critical zero-day vulnerability in MOVEit Transfer exploited by attackers!
A critical zero-day vulnerability in Progress Software’s enterprise managed file transfer solution MOVEit Transfer is being exploited by attackers to grab corporate data. “[The vulnerability] could lead to escalated privileges and potenti.....»»
Attackers leave organizations with no recovery option
Organizations of all sizes are increasingly falling victim to ransomware attacks and inadequately protecting against this rising cyberthreat, according to Veeam. One in seven organizations will see almost all (>80%) data affected as a result of a ran.....»»