Some Windows 11 Upgrade Links Could Be Malware

There’s a new hacking campaign underway that you need to be aware of especially if you or anyone you know is interested in upgrading to Windows 11. The campaign appears to be a legitimate offer from Microsoft and it gives users the opportunity to upgrade to Windows 11 for free. Unlike many campaigns of this type, this one distinguishes itself …

Microsoft Exchange Servers Targeted By Hackers

If you rely on a Microsoft Exchange server to handle email for your company, there is something you should be aware of. Recent research by security and analytics company Varonis has discovered that an affiliate of Hive ransomware has begun targeting Exchange servers that are vulnerable to ProxyShell security issues. If the group in question finds a vulnerable server, they’ll …

Some Android Devices May Have Media File Security Vulnerability

Do you have an Android device?  Is it built around a Qualcomm or MediaTek chipset?  If you answered yes to both of those questions, be aware that researchers at Check Point have recently discovered an issue which could put your device at risk. The team discovered a flaw in the implementation of the ALAC (Apple Lossless Audio Codec) which was …

Supply chain attacks image

New Wave of Supply Chain Cyber Attacks Expected

Throughout April, Shanghai and other major cities in China have been on lockdown due to recent COVID-19 outbreaks. Along with the ongoing war in Ukraine, these lockdowns have drastically impacted supply chains for industries around the world. We expect to see another wave of supply chain-related phishing and social engineering attacks. Cybercriminals could use this news to spoof shipping delay …

LinkedIn Now The Most Spoofed Website For Phishing Emails

Considered to be social media for professionals, LinkedIn is an invaluable tool for millions of people all over the world and a great way to make a wide range of professional connections. Unfortunately, hackers and scammers are aware of this fact and tend to gravitate to it as well. They are hoping to take advantage of the unsuspecting.  Recent research …

Update Now If You Run This WordPress Plugin

Millions of people around the world have leveraged the awesome power of WordPress to build their sites.  Whether for personal or business use, WordPress has the flexibility and functionality to create just about any type of site you can dream of. A large part of this flexibility comes from the power of plugins, but that’s the problem.  With thousands of …

Beware Zip Attachments In Emails Could Be Qbot Malware

The owners of the Qbot botnet are changing things up.  The botnet’s normal Modus Operandi for distributing their signature Qbot malware has been to push their malicious code via phishing emails which contain Microsoft Office documents laden with poisoned macros. More recently though, the group behind the botnet has switched to phishing emails carrying password-protected ZIP files which contain malicious …

This Banking Malware Can Fake Calls From Your Bank

There’s a new strain of malware that specifically targets Android users that you should be aware of.  Dubbed simply “Fakecalls,” it is a banking trojan that boasts a powerful new ability we haven’t seen before in the malware world.  It can fake a call from your bank. On its face, it looks like most of the other mobile banking apps …

Large Company Snap-On Tools Recently Hit By Data Breach

If you have any tools in your garage, odds are good that at least a few of them are Snap-on tools.  The brand is ubiquitous in the United States and the company is one of the leading manufacturers globally. They sell under a variety of different brand names and some of them you may not have heard of. Their brands …

HP Warns Users About Critical Security Vulnerability

Are you one of the legions of users who rely on the Teradici PCoIP client?  If so, be aware that whether you’re running Windows, Linux, or macOS, there’s a raft of new critical security vulnerabilities you need to be aware of. These are security issues that could potentially impact some fifteen million endpoints. The essence of the problem is that …