Cyber experts alarmed by ‘trivial’ ConnectWise vulns
22
Feb
2024

Cyber experts alarmed by ‘trivial’ ConnectWise vulns

A pair of newly-disclosed vulnerabilities in a widely-used remote desktop access application beloved of managed services providers (MSPs) is drawing…

LockBit
22
Feb
2024

ScreenConnect servers hacked in LockBit ransomware attacks

Attackers are exploiting a maximum severity authentication bypass vulnerability to breach unpatched ScreenConnect servers and deploy LockBit ransomware payloads on…

Russian Government Software Hijacked to Konni RAT
22
Feb
2024

Russian Government Software Hijacked to Konni RAT

A critical cybersecurity incident recently occurred where the Konni Remote Access Trojan (RAT), a highly covert and sophisticated malware that…

How to Analyse Linux Malware in ANY.RUN
22
Feb
2024

How to Analyse Linux Malware in ANY.RUN

Linux, traditionally viewed as a more secure operating system than Windows, has experienced a notable increase in malware attacks. In…

Apple Shortcuts Vulnerability Exposes Sensitive Data, Update Now!
22
Feb
2024

Apple Shortcuts Vulnerability Exposes Sensitive Data, Update Now!

Apple Shortcuts security vulnerability (CVE-2024-23204) allows attackers to access targeted devices and steal sensitive data – update your devices now!…

Toshiba and Orange offer quantum secure data transmission with utmost security
22
Feb
2024

Toshiba and Orange offer quantum secure data transmission with utmost security

Toshiba, the Japanese electronics giant, and Orange, a major telecom company, have unveiled breakthroughs in quantum secure data transmission. Their…

Why ransomware gangs love using RMM tools—and how to stop them
22
Feb
2024

Why ransomware gangs love using RMM tools—and how to stop them

One of the most alarming trends our ThreatDown Intelligence team has noticed lately is the increased exploitation of legitimate Remote…

Quantum-Proof Encryption for iMessage
22
Feb
2024

Apple Unveils PQ3 Protocol – Post-Quantum Encryption for iMessage

Feb 22, 2024NewsroomQuantum Computing / Encryption Apple has announced a new post-quantum cryptographic protocol called PQ3 that it said will…

Law to clear hundreds of wrongfully convicted subpostmasters expected in July
22
Feb
2024

Law to clear hundreds of wrongfully convicted subpostmasters expected in July

The government expects a law to overturn Post Office Horizon scandal-related criminal convictions in July, but said it “will not…

Multiple XSS flaws in Joomla can lead to remote code execution
22
Feb
2024

Multiple XSS flaws in Joomla can lead to remote code execution

Multiple XSS flaws in Joomla can lead to remote code execution Pierluigi Paganini February 22, 2024 Joomla maintainers have addressed…

Massive Verizon, AT&T, and T-Mobile mobile outage impacts US customers
22
Feb
2024

Massive AT&T, Verizon, and T-Mobile outage impacts US customers

Tens of thousands of U.S. customers from Verizon, T-Mobile, and AT&T are complaining Thursday morning about the lack of wireless…

How to Analyse Crypto Malware in ANY.RUN Sandbox ?
22
Feb
2024

How to Analyse Crypto Malware in ANY.RUN Sandbox ?

ANY.RUN, an interactive malware sandbox, has published a comprehensive analysis of the growing threat that crypto-malware poses in a time…