Following a frenzied year where businesses were forced to adapt overnight to fully remote environments and brand-new threats, we enter 2021 with heightened stability and knowledge...
Sophos has published new research, “Gootloader Expands Its Payload Delivery Options,” that details how the delivery method for the six-year-old Gootkit financial malware has been developed into...
An unsecured server belonging to a data analytics company exposed an estimated 30TB of business records online, resulting in the firm being held to ransom. Polecat is a...
In an incident report published on Friday, Google said that a Google Voice outage affecting a majority of the telephone service’s users earlier this month was...
Windows 10 ‘Sun Valley’ UI refresh, otherwise known as ‘version 21H2’, is reportedly arriving in the second half of this year and it will also include...
The National Security Agency (NSA) and Microsoft are advocating for the Zero Trust security model as a more efficient way for enterprises to defend against today’s increasingly...
Microsoft has fixed a Windows 10 bug that could cause NTFS volumes to become corrupted by merely accessing a particular path or viewing a specially crafted...
Project Zero, Google’s 0day bug-hunting team, shared technical details and proof-of-concept (PoC) exploit code for a critical remote code execution (RCE) bug affecting a Windows graphics...
Cryptocurrency scammers have made at least $145,000 this week by promoting fake giveaways through hacked verified Twitter accounts. Last month, we reported an increasing trend where...
A recent cryptomining botnet campaign has been observed using Bitcoin blockchain transactions to hide its backup C2 IP addresses. It’s a very effective way of staying...