Monthly Archives: June 2022
How to Protect Your Data When Ransomware Strikes.
Block phishing attacks and cloak web-enabled apps.Detect and respond to anomalous behaviors.Proactive encryption.
Introduction:Ransomware is not a new attack vector. In fact, the first malware...
Microsoft Warns of Cryware Targeting Crypto Wallets.
Hot wallets targeted.Use ransom payment to avoid detection.Private keys, seed phrases, and wallet address are not safe.
Introduction:Microsoft is warning of an emerging threat targeting...
Microsoft Updates Cause AD Authentication Errors.
AD authentications errors and failures.Privilege escalation vulnerabilities in Windows Kerbose.Manually map the certificates to a user.
Introduction:Microsoft is alerting customers that its May Patch Tuesday...
Malware Runs on iPhone Even When it’s OFF
Malware executes during LPM.Bluetooth firmware not encrypted.Threat actor able to keep remote tabs on target.
Introduction:A first-of-its-kind security analysis of iOS Find My function has...
Android Fraud is on the Rise.
40% increase in malware that abuse Android OS.Almost impossible to detect.On-device fraud stealthy rogue transactions.
Introduction:An analysis of the mobile threat landscape in 2022 shows...
Google Supports Passwordless Login Technology.
FIDO sign-in system does away with passwords.Securely sign in across different platforms.Passkeys sync from cloud backup.
Introduction:Google today announced plans to implement support for passwordless...
Attackers Use Event Logs to Hide Fileless Malware
Attackers use anti-detection methods.Plant fileless malware on target machines.Attackers remain unidentified.
Introduction:Researchers have discovered a malicious campaign utilizing a never-before-seen technique for quietly planting fileless...
Critical Bugs Affect Aruba and Avaya Network Switches
Five severe security flaws.Three critical flaws in APC Smart-UPS.Misuse of NanoSSL.
Introduction:Cybersecurity researchers have detailed as many as five severe security flaws in the implementation...
Unpatched DNS Vulnerability Affects IoT Devices.
DNS poisoning.Serious risk to IoT products.C libraries bug.
Introduction:Cybersecurity researchers have disclosed an unpatched security vulnerability that could pose a serious risk to IoT products.
Details:The...
WordPress Sites Hacked to Redirect Visitors to Scam Sites.
Breached over 6,500 websites..Infects files such as jquery.min.js.Malicious JavaScript.
Introduction:Cybersecurity researchers have disclosed a massive campaign that is responsible for injecting malicious JavaScript code into...