Making better cybersecurity training: Q&A with Malwarebytes expert Kelsey Prichard

Malwarebytes cybersecurity training expert Kelsey Prichard talks about how she develops smart, engaging trainings in this Q&A.

Read more

Microsoft, CISA and NSA offer security tools and advice, but will you take it?

Microsoft, CISA, and the NSA are individually offering tools and advice that aim to improve security for organizations. But will the targeted audience have the time and resources to accept that help?

Read more

FBI and CISA warn of APT groups exploiting ADSelfService Plus

APT actors are exploiting a recently-discovered flaw in ManageEngine’s self-service password management product.

Read more

Patch now! Microsoft Exchange is being attacked via ProxyShell

A new threat actor is using ProxyShell vulnerabilities and PetiPotam attacks to drop the LockFile ransomware.

Read more

Cars and hospital equipment running Blackberry QNX may be affected by BadAlloc vulnerability

Blackberry QNX RTOS, which is used in many cars, hospital equipment, and industrial applications, is affected by BadAlloc vulnerability.

Read more

UDP Technology IP Camera firmware vulnerabilities allow for attacker to achieve root

Researchers found 11 vulnerabilities in IP camera firmware, but the vendor refused to work with them. As a result users are left wondering whether their camera’s can be taken over remotely.

Read more

StopRansomware.gov brings together information on stopping and surviving ransomware attacks

StopRansomware.gov is designed to be a one-stop hub for ransomware resources.

Read more

UPDATED: Patch now! Emergency fix for PrintNightmare released by Microsoft

Microsoft has issued out-of-band updates for the remote code execution PrintNightmare vulnerability.

Read more

JBS says it is recovering quickly from a ransomware attack

JBS, one of the world’s largest meat and poultry processors, suffered a ransomware attack that shut down some of their plants.

Read more

Colonial Pipeline attack expected to trigger imminent hardening of cybersecurity rules for federal agencies

Colonial Pipeline’s ransomware attack caused the White House to possibly refine a planned Executive Order on cybersecurity.

Read more

Select your language