Windows Server 2012 / 2012 R2 End of Life – Here’s How to Secure your Legacy Servers
Byline: Michael Gorelik, CTO of Morphisec Microsoft’s decision to end support for Windows Server 2012 and 2012 R2 should surprise no one. But the…
Byline: Michael Gorelik, CTO of Morphisec Microsoft’s decision to end support for Windows Server 2012 and 2012 R2 should surprise no one. But the…
Russia-linked APT29 targeted German political parties with WINELOADER backdoor Pierluigi Paganini March 23, 2024 Russia-linked threat actors employ the WINELOADER backdoor in recent attacks targeting…
Opera has reported a substantial 164% increase in new European Union users on iOS devices after Apple introduced a new feature to comply with the…
Organizations in different industries rely on cloud backups to secure critical business data. In recent years, backup to the cloud has evolved into an easy,…
Large-scale Sign1 malware campaign already infected 39,000+ WordPress sites Pierluigi Paganini March 23, 2024 A large-scale malware campaign, tracked as Sign1, has already compromised 39,000…
Mozilla fixed Firefox zero-days exploited at Pwn2Own Vancouver 2024 Pierluigi Paganini March 23, 2024 Mozilla addressed two Firefox zero-day vulnerabilities exploited during the Pwn2Own Vancouver…
23 Mar Former White House CIO: A Trailblazer And Woman In Cybersecurity This week in cybersecurity from the editors at Cybercrime Magazine –Read the Full…
The next time you stay in a hotel, you may want to use the door’s deadbolt. A group of security researchers this week revealed a…
German police seized the darknet marketplace Nemesis Market Pierluigi Paganini March 23, 2024 The German police seized the infrastructure of the darknet marketplace Nemesis Market…
A new phishing campaign targets users with emails containing a button to “verify payment information.” Clicking the button triggers the download of a malicious JAR…
Unsaflok, in Dormakaba’s Saflok electronic RFID locks used in hotels and multi-family housing, allows attackers to forge a master keycard by exploiting weaknesses in the…
Researchers have unveiled a new class of microarchitectural side-channel attacks that pose a severe threat to the security of Apple CPUs. The attack, GoFetch, exploits…