Microsoft fixes 6 zero-days under active attack
August 2024 Patch Tuesday is here, and Microsoft has delivered fixes for 90 vulnerabilities, six of which have been exploited in the wild as zero-days,…
August 2024 Patch Tuesday is here, and Microsoft has delivered fixes for 90 vulnerabilities, six of which have been exploited in the wild as zero-days,…
Security researchers have found a trove of threat actor tools that can bypass security defenses like Windows Defender and Malwarebytes, delete backups, disable systems, and…
A PoC exploit code is available for critical Ivanti vTM bug Pierluigi Paganini August 13, 2024 Ivanti warned of a critical authentication bypass flaw in…
Kootenai Health has disclosed a data breach impacting over 464,000 patients after their personal information was stolen and leaked by the 3AM ransomware operation. Kootenai…
As a CEO, managing third-party risk is a critical aspect of your organization’s overall risk management strategy. With the increasing reliance on third-party vendors and…
Microsoft has released the KB5041585 cumulative update for Windows 11 23H2, which includes many improvements and changes, including the ability to directly drag apps from the Pinned…
The United States’ National Institute of Standards and Technology (NIST) has debuted three new encryption algorithms that it claims will help safeguard critical data from…
Microsoft has fixed a known issue causing some Windows devices to boot into BitLocker recovery after installing last month’s Windows security updates. Those affected by…
The suspected architect of the Ransomware-as-a-service model, who called himself the “J.P. Morgan” of the underground cybercrime world, has been arrested and extradited from Poland…
Microsoft has released the KB5041580 cumulative update for Windows 10 22H2 and Windows 10 21H2, which includes 14 changes and fixes, including BitLocker fixes and important…
Security researchers at Perception Point have uncovered a sophisticated phishing campaign, dubbed “Uncle Scam.” In this AI-powered campaign, threat actors impersonate U.S. government agencies to…
Cloud computing underpins countless applications, services, and company initiatives. However, the environmental footprint of these activities has started to come under scrutiny. Today’s IT leaders…