Ransomware review: January 2024
This article is based on research by Marcelo Rivero, Malwarebytes’ ransomware specialist, who monitors information published by ransomware gangs on their Dark Web sites. In…
This article is based on research by Marcelo Rivero, Malwarebytes’ ransomware specialist, who monitors information published by ransomware gangs on their Dark Web sites. In…
Jan 11, 2024NewsroomCloud Security / Cyber Attacks A new Python-based hacking tool called FBot has been uncovered targeting web servers, cloud services, content management systems…
Two zero-day bugs in Ivanti Connect Secure actively exploited Pierluigi Paganini January 11, 2024 Ivanti revealed that two threat actors are exploiting two zero-day vulnerabilities…
A critical vulnerability of severe severity has been found in Cisco Unity Connection’s web-based management interface. This flaw might allow a remote, unauthenticated attacker to…
Over time, your Mac may experience a slowdown, prompting the need to explore methods to enhance its speed. Fortunately, one effective solution is the use…
Jan 11, 2024NewsroomCybersecurity / Software Security The ubiquity of GitHub in information technology (IT) environments has made it a lucrative choice for threat actors to…
A critical vulnerability in Cisco Unity Connection – a messaging and voicemail product that forms part of the networking supplier’s unified communications lineup – could…
CISA adds Ivanti and Microsoft SharePoint bugs to its Known Exploited Vulnerabilities catalog Pierluigi Paganini January 11, 2024 U.S. Cybersecurity and Infrastructure Security Agency (CISA)…
I hope you’ve been doing well! ✈️ In Plane Sight I’ve gotta get something off my chest. Normally on planes I read or get work…
The Finish National Cybersecurity Center (NCSC-FI) is informing of increased Akira ransomware activity in December, targeting companies in the country and wiping backups. The agency says that the…
In the era of social media, users freely share a plethora of information with their connections and followers, often overlooking the potential threat to their…
Hackers have found a way to gain unauthorized access to Google accounts, bypassing any multi-factor authentication (MFA) the user may have set up. To do…