Monthly Archives: June 2022
New Hertzbleed Side Channel Attack Affects All Modern AMD and Intel CPUs
A newly discovered security vulnerability in modern Intel and AMD processors could let remote attackers steal encryption keys via a power side channel attack.
Dubbed Hertzbleed by...
Panchan: A New Golang-based Peer-To-Peer Botnet Targeting Linux Servers
A new Golang-based peer-to-peer (P2P) botnet has been spotted actively targeting Linux servers in the education sector since its emergence in March 2022.
Dubbed Panchan by Akamai...
Critical Flaw in Cisco Secure Email and Web Manager Lets Attackers Bypass Authentication
Cisco on Wednesday rolled out fixes to address a critical security flaw affecting Email Security Appliance (ESA) and Secure Email and Web Manager that...
MaliBot: A New Android Banking Trojan Spotted in the Wild
A new strain of Android malware has been spotted in the wild targeting online banking and cryptocurrency wallet customers in Spain and Italy, just...
Difference Between Agent-Based and Network-Based Internal Vulnerability Scanning
For years, the two most popular methods for internal scanning: agent-based and network-based were considered to be about equal in value, each bringing its...
A Microsoft Office 365 Feature Could Help Ransomware Hackers Hold Cloud Files Hostage
A "dangerous piece of functionality" has been discovered in Microsoft 365 suite that could be potentially abused by a malicious actor to ransom files...
BlackCat Ransomware Gang Targeting Unpatched Microsoft Exchange Servers
Microsoft is warning that the BlackCat ransomware crew is leveraging exploits for unpatched Exchange server vulnerabilities to gain access to targeted networks.
Upon gaining an entry point,...
Top 5 Online Frauds Targeting Americans
The benefits of technology are immense. Sitting in your home, you can pay your bills, shop for groceries and gadgets, and communicate with family...
What Is Computer Maintenance?
Most companies rely on their computer networks to provide meaningful assistance in the delivery of top quality services. Equipment failure might have disastrous consequences...
5 Benefits of Data Backup
As far as the security of vital information goes, it's important that business owners take necessary steps to make sure that the data is...