A List of Vulnerable Products to the Log4j Vulnerability

Two days ago, we wrote a post about the Log4j vulnerability that is currently wreaking havoc on the cyberthreat landscape. The flaw stands for an open-source Java logging library. By…

IoT under attack: Security is still good not enough on these edge devices

With IoT botnets continuing to cause problems and attacks on critical infrastructure a ongoing menace, Microsoft has conducted research to find out whether edge network devices are a threat to…

Tactical Threat Intelligence: What is it and practical use cases

As digital technologies continue to become central to every industry, they foster greater connectivity, automation and potential for advancement. But, they also increase the threat of cyber-attacks, forcing security experts…

Toss a Coin to your Helper (Part 2 of 2)

Avast –  Avast –  In the first posting of this series, we looked at a clipboard stealer belonging to the MyKings botnet. In this second part of the blog series,…

This stealthy malware hides behind an impossible date

Security researchers have discovered new remote access trojan (RAT) malware that has created an unusual new way of hiding on servers. As first reported on BleepingComputer, this new malware, dubbed…

GoDaddy Breached – Plaintext Passwords Used – 1.2M Affected

WordFence –  WordFence –  This morning, GoDaddy disclosed that an unknown attacker had gained unauthorized access to the system used to provision the company’s Managed WordPress sites, impacting up to…

Microsoft warning: Now Iran's hackers are attacking IT companies, too

Microsoft has raised an alarm about a massive surge in Iranian state-sponsored hacking attempts against IT services firms. ZDNet Recommends According to Microsoft, attacks from state-sponsored Iranian hackers on IT…

Microsoft warning: Now Iran's hackers are attacking IT companies, too

Microsoft has raised an alarm about a massive surge in Iranian state-sponsored hacking attempts against IT services firms. ZDNet Recommends According to Microsoft, attacks from state-sponsored Iranian hackers on IT…

Now Iran's state-backed hackers are turning to ransomware

Microsoft has detailed the activities of six Iranian hacker groups that are behind waves of ransomware attacks that have arrived every six to eight weeks since September 2020.  Russia is…

This new attack bypasses Rowhammer defenses in most DRAM, say researchers

Researchers have revealed a new type of Rowhammer attack on DRAM devices that can reliably bypass mitigations implemented by vendors after the first such attacks emerged in 2014.  ZDNet Recommends…