Please turn on your JavaScript for this page to function normally.
Patch Tuesday
Microsoft patches actively exploited Windows zero-day (CVE-2021-40449)

On October 2021 Patch Tuesday, Microsoft has fixed 71 CVE-numbered vulnerabilities. Of those, only one was a zero-day exploited in attacks in the wild (CVE-2021-40449) and …

CloudLinux appoints Dave Mello as CXO

CloudLinux has appointed Dave Mello to the position of chief experience officer (CXO). In this newly created role Mello is responsible for the strategy and execution of the …

AMTSO appoints Alexander Ivanyuk and David Ellis as new board members

AMTSO announced that their members have elected a new board, appointing Alexander Ivanyuk, Senior Director of Product and Technology, at global technology company Acronis, and …

Shenoy Sandeep joins Cyble as Regional Director of META

Cyble announced that regional cybersecurity expert Shenoy Sandeep has joined Cyble as the Regional Director – Middle East, Turkey, and Africa (META). This news follows …

industrial
Critical flaw in Rockwell PLCs allows attackers to fiddle with them (CVE-2021-22681)

A critical, easy to exploit vulnerability (CVE-2021-22681) may allow attackers to remotely connect to a number of Rockwell Automation’s programmable logic controllers …

SolarWinds
SolarWinds hack investigation reveals new Sunspot malware

Crowdstrike researchers have documented Sunspot, a piece of malware used by the SolarWinds attackers to insert the Sunburst malware into the company’s Orion software. …

remcos
Can you trust attachments with unfamiliar extensions?

Microsoft’s security experts have warned on Monday about several email malware delivery campaigns exploiting the COVID-19 pandemic targeting companies in the US and …

World Health Organization
Hackers try to breach WHO, other COVID-19-fighting orgs

“Elite” hackers have tried – and failed – to breach computer systems and networks of the World Health Organization (WHO) earlier this month, Reuters …

snake
2020 cybersecurity risks: Insecure security tools, supply chains, abandonware

Considerable time and money are invested into looking for dangerous vulnerabilities in the most commonly used elements of IT infrastructure. Popular operating systems, …

danger
Fake alerts about outdated security certificates lead to malware

Cyber criminals have been trying out a new approach for delivering malware: fake alerts about outdated security certificates, complete with an “Install …

patch
December 2019 Patch Tuesday: Microsoft fixes one actively exploited zero-day

For December 2019 Patch Tuesday, Microsoft and Adobe have released the final scheduled security updates for this year, Intel has fixed Plundervolt, and Google has delivered …

Phishing
Assessing the efficiency of phishing filters employed by email service providers

Technology companies could be doing much more to protect individuals and organizations from the threats posed by phishing, according to research by the University of Plymouth. …

Don't miss

Cybersecurity news