Log4j has dominated recent discussions around cybersecurity vulnerabilities, but the emergence of the Java logging library security flaw has allowed…
Blog
While social media may not be the number one source of crypto fraud –that would be decentralized finance (DeFi), according to Chainalysis –…
Microsoft announced today that it will make it difficult to enable VBA macros downloaded from the Internet in several Microsoft…
Czech cybersecurity software firm Avast has released a decryption utility to help TargetCompany ransomware victims recover their files for free. However,…
A new Sugar Ransomware operation actively targets individual computers, rather than corporate networks, with low ransom demands. First discovered by…
Almost every compromised Microsoft account lacks multi-factor authentication (MFA), but few organizations enable it even though it’s available, according to…
A cross-site scripting (XSS) Zimbra security zero-day bug is actively exploited in attacks targeting European media and government organizations. Zimbra…
Social media is part of our social fabric. So much so that nearly 50% of the global population are social media…
Phishing kits designed to circumvent multi-factor authentication (MFA) by stealing session cookies are increasingly popular on the cybercrime underground, security…
Microsoft has detailed the evolution of a relatively new piece of Mac malware called UpdateAgent that started out stealing system…