Apple M1 Macs Are Not Immune To Malware

Patrick Wardle is a legend in the Apple ecosystem, and one of the best independent security researchers out there. Not long ago, he sang Apple’s praises for the security of their M1 processor. More recently however, he made a rather disturbing discovery, finding malware in the wild that specifically targets the new chip. Wardle had this to say about the …

Hackers Are Using DDOS Attacks To Profit Off Businesses

Distributed Denial of Service Attacks (DDOS) have been used by hackers since the earliest days of the web. Get enough internet-connected devices to ping a server at the same time, and you can knock the server offline. Keep the pressure on and you can keep it offline, pretty much indefinitely. These days, given the web’s importance, that can easily bring …

New Version Of Jupyter Malware Spotted In The Wild

Researchers from cybersecurity company Morphisec have recently discovered a new strain of malware they believe has been in the wild of the internet since at least May of this year (2020). Dubbed Jupyter, this strain is classed as an Info Stealer. It focuses on getting into user names, passwords and other private systems and exfiltrating that data to a server …

New Updates For Office 365 Will Include Phishing Protection

Are you an Office 365 user? If so, be aware that Microsoft is adding some powerful new protections to the software suite, designed to make you safer. Hackers commonly target Office 365 users with a type of attack known as “Consent Phishing.” That basically means that the hacker in question will use a variety of social engineering techniques to try …

Cisco Data Center Manager Software Users Should Patch Immediately

Do you use Cisco’s Data Center Manager Software? If so, be advised that the company recently issued an advisory concerning a serious security flaw. The advisory reads, in part, as follows: “The vulnerability exists because different installations share a static encryption key. An attacker could exploit this vulnerability by using the static key to craft a valid session token. A …

Cyber Attack graphic

What’s Selling On The Dark Web?

When you picture what sells in Dark Web markets, you’re probably thinking about things like stolen corporate data, pirated software, and lists of passwords. But that’s not the whole picture – and what you don’t know can hurt you, because it might just fuel the next cyberattack against your business. 60% of the Information for Sale on the Dark Web …

New Chromium Based Edge Browser Update From Windows 10

Microsoft has been talking for months about their new Edge browser based on Chromium technology. Users will finally be able to see it in action as of the KB4559309 Windows 10 update, which will replace the legacy Edge browser with the company’s latest offering. It should be noted that previous Windows 10 releases did include the new Chromium-based Edge browser, …

Microsoft’s Edge Browser To Release New Features

Microsoft recently re-reinvented its web browser. After finally giving up on bug-plagued Internet Explorer, the company introduced Microsoft Edge, which it hoped would take the internet community by storm. When that didn’t happen, they re-introduced Edge, this time as a Chromium-based browser, which essentially made it a Google Chrome clone. The company is clearly not thrilled with that. Since the …

Hackers Stopped With Help of Microsoft Digital Crimes Unit

Microsoft’s Digital Crimes Unit (DCU) recently played an instrumental role in taking down a botnet made up of more than 400,000 devices. A botnet is a tool that hackers use to invade systems. The botnets were rented out to a variety of groups to conduct DDoS attacks, launch phishing campaigns, and deliver a variety of different types of malware. Of …

Private Twitter Files May Have Been Cached In Firefox

Are you a regular Twitter user? More specifically, are you a regular Twitter user who also prefers the Firefox web browser? If so, be advised that Twitter recently disclosed a new bug with potentially dire implications for you. Apparently, a flaw in the design of the platform itself caused it to store private files inside Firefox’s browser cache. The cache …