06 Jun

Microsoft shows venerable and vulnerable NTLM security protocol the door

Microsoft has finally decided to add the venerable NTLM authentication protocol to the Deprecated Features list. The announcement means that admins dragging their feet to

Author rabih
06 Jun

7-year-old Oracle WebLogic bug under active exploitation

A seven-year-old Oracle vulnerability is the latest to be added to CISA’s Known Exploited Vulnerability (KEV) catalog, meaning the security agency considers it a significant

Author rabih
06 Jun

The job hunter’s guide: Separating genuine offers from scams

Scams $90,000/year, full home office, and 30 days of paid leave, and all for a job as a junior data analyst – unbelievable, right? This

Author rabih
06 Jun

Microsoft Research chief scientist has no issue with Windows Recall

Asked to explore the data privacy issues arising from Microsoft Recall, the Windows maker’s poorly received self-surveillance tool, Jaime Teevan, chief scientist and technical fellow

Author rabih
05 Jun

TikTok confirms CNN, other high-profile accounts hijacked via zero-day vulnerability

Miscreants exploited a zero-day in TikTok to compromised the accounts of CNN and other big names. The app maker has confirmed there was a cyberattack,

Author rabih
05 Jun

What is RansomHub? Looks like a Knight ransomware reboot

RansomHub, a newish cyber-crime operation that has claimed to be behind the theft of data from Christie’s auction house and others, is “very likely” some

Author rabih
05 Jun

Who are these RansomHub cyber-thieves? Looks like a Knight ransomware reboot

RansomHub, a newish cyber-crime operation that has claimed to be behind the theft of data from Christie’s auction house and others, is “very likely” some

Author rabih
05 Jun

Emergency patches released for critical vulns impacting EOL Zyxel NAS boxes

Zyxel just released security fixes for two of its obsolete network-attached storage (NAS) devices after an intern at a security vendor reported critical flaws months

Author rabih
05 Jun

London hospitals left in critical condition after ransomware attack

Hospitals in London are struggling to deliver pathology services after a ransomware attack at a service partner downed some key systems. NHS England’s London region

Author rabih
05 Jun

4 cuffed following probe into holiday scheme for cybercrooks

Four arrests were made this week as part of an international probe into two overlapping corruption schemes that allowed cybercrims on INTERPOL watch lists to

Author rabih
05 Jun

How To Prevent Your Emails From Being Hacked

My mother recently turned 80, so of course a large celebration was in order. With 100 plus guests, entertainment, and catering to organise, the best

Author rabih
05 Jun

Microsoft paid Tenable a bug bounty for an Azure flaw it says doesn’t need a fix, just better documentation

A vulnerability — or just Azure working as intended, depending on who you ask — in Microsoft’s cloud potentially allows miscreants to wave away firewall

Author rabih
04 Jun

Command senior chief busted for secretly setting up Wi-Fi on US Navy combat ship

The US Navy has cracked down on an illicit Wi-Fi network installed on a combat ship by demoting the command senior chief who ordered it

Author rabih
04 Jun

Pentagon ‘doubling down’ on Microsoft despite ‘massive hack,’ senators complain

The Pentagon is “doubling down” on its investment in Microsoft products despite the serious failings at the IT giant that put America’s national security at

Author rabih
04 Jun

London hospitals declare critical incident after service partner ransomware attack

Hospitals in London are struggling to deliver pathology services after a ransomware attack at a service partner downed some key systems. NHS England’s London region

Author rabih
04 Jun

Christie’s stolen data sold to highest bidder rather than leaked, RansomHub claims

The cybercrims who claimed the attack on Christie’s fancy themselves as auctioneers as well, after they allegedly sold off the company’s data to the highest

Author rabih
04 Jun

Microsoft accused of tracking kids with education software

A privacy campaign group with a strong record in legal upheavals has asked the Austrian data protection authority to investigate Microsoft 365 Education to clarify

Author rabih
04 Jun

Cybercrooks get cozy with BoxedApp to dodge detection

Malware miscreants are increasingly showing a penchant for abusing legitimate, commercial packer apps to evade detection. Jiří Vinopal, threat researcher at Check Point Research, says

Author rabih
Load moreLoadingAll items loaded