Logo Cyber News

Logo Dorin M Wolf

 

- Compromise of U.S. Water Treatment Facility. (to the original material)
 
- Verify Your Valentine. (to the original material)
 
- Microsoft released a patch for the actively exploited vulnerability in the Windows kernel. (to the original material)
 
- Avaddon ransomware fixes flaw allowing free decryption. (to the original material)
 
- Internet Explorer 11 zero-day vulnerability gets unofficial micropatch. (to the original material)
 
- Microsoft avertizează cu privire la numărul tot mai mare de atacuri web shell. (to the original material)
 
- Singtel, QIMR Berghofer report Accellion-related data breaches. (to the original material)
 
- Buggy WordPress plugin (Responsive Menu) exposes 100K sites to takeover attacks. (to the original material)
 
- Intel fixes vulnerabilities in Windows, Linux graphics drivers. (to the original material)
 
- 12-year-old Windows Defender bug gives hackers admin rights. (to the original material)
 
- TrickBot's BazarBackdoor malware is now coded in Nim (programming language) to evade antivirus. (to the original material)
 
- Hackers ask only $1,500 for access to breached company networks. (to the original material)
 
- January 2021’s Most Wanted Malware: Emotet Continues Reign as Top Malware Threat Despite Takedown. (to the original material)
 
- IPCDump: Open-source tool for tracing interprocess communication on Linux. (to the original material)
 
- 5G experimentation and security grows in govt, military sectors. (to the original material)
 
- People are often the collateral damage of attacks on corporations. (to the original material)
 
- Credential spill incidents nearly doubled since 2016. (to the original material)
 
- Protecting productivity within the disappearing perimeter. (to the original material)
 
- Big Tech will try to pre-empt harsh privacy laws by writing their own. (to the original material)
 
- Which users are at higher risk of email-based phishing and malware? (to the original material)
 
- Vulnerabilities in widely used TCP/IP stacks open IoT, OT devices to attack. (to the original material)

 

Logo Dorin M Wolf

No comments