Microsoft 365 users report Outlook, Teams won’t start or freezes
Network and IT admins have been dealing with ongoing Microsoft 365 issues this week, reporting that some end users cannot...
Network and IT admins have been dealing with ongoing Microsoft 365 issues this week, reporting that some end users cannot...
The U.S. National Security Agency (NSA) released today guidance on how to defend against BlackLotus UEFI bootkit malware attacks. BlackLotus...
Security researchers have found a simple way to deliver malware to an organization with Microsoft Teams, despite restrictions in the...
The North Korean APT37 hacking group uses a new 'FadeStealer' information-stealing malware containing a 'wiretapping' feature, allowing the threat actor...
DuckDuckGo has released its privacy-centric browser for Windows to the general public. It is a beta version available for download...
VMware has addressed multiple high-severity security flaws in vCenter Server, which can let attackers gain code execution and bypass authentication...
Millions of GitHub repositories may be vulnerable to dependency repository hijacking, also known as "RepoJacking," which could help attackers deploy...
On Thursday, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) added six more security flaws to its known exploited vulnerabilities...
Microsoft says Internet-exposed Linux and Internet of Things (IoT) devices are being hijacked in brute-force attacks as part of a...
A variant of the Mirai botnet is targeting almost two dozen vulnerabilities aiming to take control of D-Link, Arris, Zyxel,...
The Chinese state-sponsored hacking group tracked as APT15 has been observed using a novel backdoor named 'Graphican' in a new...
Car mount and mobile accessory maker iOttie warns that its site was compromised for almost two months to steal online...
Multinational shipping company UPS is alerting Canadian customers that some of their personal information might have been exposed via its...
Proof-of-concept exploit code is now available for a high-severity flaw in Cisco Secure Client Software for Windows (formerly AnyConnect Secure...
The Federal Trade Commission (FTC) says Amazon allegedly used dark patterns to trick millions of users into enrolling in its...
The world of cybercrime is moving quickly. Threat actors, ransomware gangs, malware developers, and others are increasingly and rapidly moving...
More than 101,000 ChatGPT user accounts have been stolen by information-stealing malware over the past year, according to dark web...
Staying ahead of threat actors is a game of cat and mouse, with attackers often having the upper hand. In...
Image: Bing Image Creator A threat group tracked as APT28 and linked to Russia's General Staff Main Intelligence Directorate (GRU)...
A cyberespionage and hacking campaign tracked as 'RedClouds' uses the custom 'RDStealer' malware to automatically steal data from drives shared...
Zyxel is warning its NAS (Network Attached Storage) devices users to update their firmware to fix a critical severity command...
An unknown threat actor is brute-forcing Linux SSH servers to install a wide range of malware, including the Tsunami DDoS...
A new DDoS-as-a-Service botnet called "Condi" emerged in May 2023, exploiting a vulnerability in TP-Link Archer AX21 (AX1800) Wi-Fi routers...
Microsoft has addressed an Azure Active Directory (Azure AD) authentication flaw that could allow threat actors to escalate privileges and...