New DocuSign Phishing Campaign

Phishing attacks that have as victims non-executive employees with access to sensitive corporate information are becoming more common. According to the researchers at Avanan, half of all phishing emails analyzed…

CISA outlines cyberthreats targeting US water and wastewater systems

In a new advisory, CISA has warned US water and wastewater system operators about an array of cyberthreats aimed at disrupting their operations. Cybersecurity company Dragos worked with CISA, the…

Rickroll Grad Prank Exposes Exterity IPTV Bug

IPTV and IP video security is increasingly under scrutiny, even by high school kids. When Township High School District 214 in Illinois got rickrolled all at once across its six…

Windows security: 20 years on from Bill Gates' Trustworthy Computing memo, how much has changed?

It’s almost 20 years since then-Microsoft boss Bill Gates wrote his famous Trustworthy Computing memo, in which he urged the company to produce more secure software.  “Eventually, our software should…

Android Privacy Issues Were Discovered in a New Study

A UK team of researchers has carried out a study discovering some Android privacy issues related to Android smartphones. Huawei Android devices, Realme, Xiaomi, and Samsung represented the experts’ focus…

University of Sunderland Hit by Suspected Cyber-Attack

University of Sunderland Hit by Suspected Cyber-Attack A UK university has suffered a suspected cyber-attack, causing "extensive IT issues." The University of Sunderland revealed the incident on its official Twitter account this…

Microsoft Azure customer hit by 2.4 Tbps DDoS attack

Microsoft has confirmed to mitigate a massive DDoS attack originated from a botnet comprising 70,000 compromised IoT devices. Microsoft reported that an unnamed customer of its Azure cloud platform was…

Intune vs. WSUS vs. SCCM – Costs, Benefits, Ease of Use, and Deployment

Patching has certainly gained a lot of momentum ever since research has proven that ‘unattended’ apps and software can quickly lead to a data leak.  Patching is the new ‘kid’…

Help Net Security Publishes a Report on Extended Detection and Response (XDR)

Help Net Security, an independent site focusing on information security, has recently started a new series of reports in order to help CISOs worldwide choose what’s best for their organization when…