privilege
-
Some Worms Use Their Powers for Good
Gardeners know that worms are good. Cybersecurity professionals know that worms are bad. Very bad. In fact, worms are literally…
Read More » -
Ex-Canadian Government Employee Pleads Guilty Over NetWalker Ransomware Attacks
A former Canadian government employee this week agreed to plead guilty in the U.S. to charges related to his involvement…
Read More » -
CISA Warns of Active Exploitation of ‘PwnKit’ Linux Vulnerability in the Wild
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) this week moved to add a Linux vulnerability dubbed PwnKit to its…
Read More » -
Over a Dozen Flaws Found in Siemens’ Industrial Network Management System
Cybersecurity researchers have disclosed details about 15 security flaws in Siemens SINEC network management system (NMS), some of which could…
Read More » -
Patch Tuesday: Microsoft Issues Fix for Actively Exploited ‘Follina’ Vulnerability
Microsoft finally released fixes to address an actively exploited Windows zero-day vulnerability known as Follina as part of its Patch…
Read More » -
Researchers Disclose Rooting Backdoor in Mitel IP Phones for Businesses
Cybersecurity researchers have disclosed details of two medium-security flaws in Mitel 6800/6900 desk phones that, if successfully exploited, could allow…
Read More » -
Evil Corp Cybercrime Group Shifts to LockBit Ransomware to Evade Sanctions
The threat cluster dubbed UNC2165, which shares numerous overlaps with a Russia-based cybercrime group known as Evil Corp, has been…
Read More » -
EnemyBot Linux Botnet Now Exploits Web Server, Android and CMS Vulnerabilities
A nascent Linux-based botnet named Enemybot has expanded its capabilities to include recently disclosed security vulnerabilities in its arsenal to…
Read More » -
Microsoft Finds Critical Bugs in Pre-Installed Apps on Millions of Android Devices
Four high severity vulnerabilities have been disclosed in a framework used by pre-installed Android System apps with millions of downloads.…
Read More » -
The Myths of Ransomware Attacks and How To Mitigate Risk
Today’s modern companies are built on data, which now resides across countless cloud apps. Therefore preventing data loss is essential…
Read More »