CISA has ordered U.S. Federal Civilian Executive Branch (FCEB) agencies to secure their servers against a VMware ESXi authentication bypass vulnerability exploited in ransomware attacks. […] Go to Source Author: Sergiu Gatlan
Category Archives: Security
The Black Basta ransomware gang has shown resilience and an ability to adapt to a constantly shifting space, using new custom tools and tactics to evade detection and spread throughout a network. […] Go to Source Author: Bill Toulas
The Black Basta ransomware gang has shown resilience and an ability to adapt to a constantly shifting space, using new custom tools and tactics to evade detection and spread throughout a network. […] Go to Source Author: Bill Toulas
Google Chrome has added app-bound encryption for better cookie protection on Windows systems and improved defenses against information-stealing malware attacks. […] Go to Source Author: Sergiu Gatlan
The City of Columbus, Ohio, says it’s investigating whether personal data was stolen in a ransomware attack on July 18, 2024 that disrupted the City’s services. […] Go to Source Author: Bill Toulas
DigiCert is warning that it will be mass-revoking SSL/TLS certificates due to a bug in how the company verified if a customer owned or operated a domain and requires impacted customers to reissue certificates within 24 hours. […] Go to Source Author: Bill Toulas
Are your password policies having a positive impact on the cybersecurity posture of your org? Learn more from Specops Software about how to align password policies with wider cybersecurity KPIs. […] Go to Source Author: Sponsored by Specops Software
The United Kingdom’s Information Commissioner’s Office (ICO) revealed today that the Electoral Commission was breached in August 2021 because it failed to patch its on-premise Microsoft Exchange Server against ProxyShell vulnerabilities. […] Go to Source Author: Sergiu Gatlan
A new version of the Android spyware ‘Mandrake’ has been found in five applications downloaded 32,000 times from Google Play, the platform’s official app store. […] Go to Source Author: Bill Toulas
Microsoft Outlook can be turned into a C2 beacon to remotely execute code, as demonstrated by a new red team post-exploitation framework named “Specula,” released today by cybersecurity firm TrustedSec. […] Go to Source Author: Sergiu Gatlan
