Lockbit Ransomware Is Trying To Become Unstoppable

Over the last couple of years ransomware has become the malware of choice for hackers around the world. It’s easy to understand why. Hackers using malware win in two different ways. If they successfully breach a corporation they can steal copies of important files and sell them on the black …

Some Older Printer Drivers Are Vulnerable To Hackers

SentinelOne recently published a report that revealed a previously undiscovered security flaw found in a wide range of printers that include printers manufactured by Samsung, Xerox, and HP. The bug is being tracked as a high severity security vulnerability and puts hundreds of millions of older printers in currently in …

Morgan Stanley Banking Latest To Get Hit By Data Breach

Hacks continue to evolve as the hackers themselves get increasingly sophisticated. One of the most recent victims is investment banking giant Morgan Stanley. Their network was breached after the attackers stole personal information belonging to their customers by hacking into an Accellion FTA server belonging to a third-party vendor, then …

Apple M1 Macs Are Not Immune To Malware

Patrick Wardle is a legend in the Apple ecosystem, and one of the best independent security researchers out there. Not long ago, he sang Apple’s praises for the security of their M1 processor. More recently however, he made a rather disturbing discovery, finding malware in the wild that specifically targets …

Hackers Are Using DDOS Attacks To Profit Off Businesses

Distributed Denial of Service Attacks (DDOS) have been used by hackers since the earliest days of the web. Get enough internet-connected devices to ping a server at the same time, and you can knock the server offline. Keep the pressure on and you can keep it offline, pretty much indefinitely. …

New Version Of Jupyter Malware Spotted In The Wild

Researchers from cybersecurity company Morphisec have recently discovered a new strain of malware they believe has been in the wild of the internet since at least May of this year (2020). Dubbed Jupyter, this strain is classed as an Info Stealer. It focuses on getting into user names, passwords and …

New Updates For Office 365 Will Include Phishing Protection

Are you an Office 365 user? If so, be aware that Microsoft is adding some powerful new protections to the software suite, designed to make you safer. Hackers commonly target Office 365 users with a type of attack known as “Consent Phishing.” That basically means that the hacker in question …

Cisco Data Center Manager Software Users Should Patch Immediately

Do you use Cisco’s Data Center Manager Software? If so, be advised that the company recently issued an advisory concerning a serious security flaw. The advisory reads, in part, as follows: “The vulnerability exists because different installations share a static encryption key. An attacker could exploit this vulnerability by using …

Cyber Attack graphic

What’s Selling On The Dark Web?

When you picture what sells in Dark Web markets, you’re probably thinking about things like stolen corporate data, pirated software, and lists of passwords. But that’s not the whole picture – and what you don’t know can hurt you, because it might just fuel the next cyberattack against your business. …

New Chromium Based Edge Browser Update From Windows 10

Microsoft has been talking for months about their new Edge browser based on Chromium technology. Users will finally be able to see it in action as of the KB4559309 Windows 10 update, which will replace the legacy Edge browser with the company’s latest offering. It should be noted that previous …