Deep Fakes are becoming an increasingly large problem. If you’re not familiar with the term, a Deep Fake is an advanced photo or video technique in which an existing person in a video is digitally overwritten by some other person. Want to make it look like a wholesome actress has …
WordPress Loginizer Plugin Was Automatically Updated Due To Vulnerability
WordPress tends to take a light-handed approach when it comes to managing the legions of plugins that are compatible with the most popular blogging platform on the planet. This time, however, they’re taking a different approach. They’re forcing a security update to counter a dangerous bug in a wildly popular …
Coordinated Effort Underway To Take Down Trickbot Malware
Score one for the good guys. A team led by Microsoft’s DCU (Digital Crimes Unit) that includes Symantec, NTT Ltd, ESET, and Lumen’s Black Lotus Labs is working on something new. They have launched a sustained, coordinated attack on Trickbot’s infrastructure in a bid to destroy it, preventing the hackers …
Adobe Patches A Number of Critical Vulnerabilities In Latest Update
If you make frequent use of Adobe products, then you’ll definitely want to give priority to applying the latest security update offered by the company. It’s an out of band patch that impacts ten different products in the Adobe lineup and is aimed squarely at addressing a number of critical …
New Windows 10 Update Shows App Warnings For Malware
A great many malware strains are designed to engage quietly during a PC’s startup process and then idle in the background. They are in the system logging keystrokes, taking screen shots at periodic intervals and uploading them to a command and control server, or doing other nefarious things. Microsoft wants …
Intel Adding Additional Security To Future Processors
Intel has had more than its share of challenges over the last couple of years. Not the least of which included a whole family of new attack vectors that made headlines and caused panic around the world. This happened as hackers discovered new ways to attack machines with ‘Intel Inside,’ …
Hacked Networks And Credentials Being Sold At Alarming Rates
Selling network access is big business on underground hacking websites. Even worse, the business is growing at an alarming rate, according to a report recently published by cyber security firm KELA. According to their report, the number of ads found on hacking forums advertising ‘Network Access’ tripled between August and …
Surge In Ransomware Continues In 2020, Targeting Healthcare
The year 2020 could well be described as the Year of Ransomware. Security researchers around the globe who monitor such things have noted a sharp uptick in the use of ransomware this year, with well known threats like REvil, Ryuk, and Maze being the most common variants deployed by hackers. …
Kraken Malware Uses Microsoft Windows Error Reporting To Exploit System
Hackers are relentless when it comes to testing the boundaries of software for potential weaknesses to exploit. It seems that an unknown group of hackers has found a new one. Based on what researchers at Malwarebytes are seeing, a group of hackers has developed a new fileless attack technique designed …
New HEH Botnet Malware Can Destroy Devices It Attacks
Security researchers at Netlab have recently reported on their discovery of a terrifying new botnet on the web. Dubbed HEH, this botnet is a different sort of threat. Unlike most others, this one is not designed to launch DDOS attacks or install malicious code. Its purpose is much simpler, and …










