Well, it’s bad. LastPass has lost a copy of customers’ encrypted password data to a hacker… Story on PCMag
Month: December 2022
Microsoft Spots macOS Vulnerability That Lets Malware Bypass Security Checks
Microsoft has identified a worrying security problem in macOS… Story on Extreme Tech
How to Decrypt Ransomware Files And What to Do When That Fails
For any organization struck by ransomware , business leaders always ask ‘how do we decrypt the data ASAP, so we can get back in business?’ The good news is that… Story on eSecurity Planet
Study: Consumer security savvy is way behind IoT threat landscape
Imagine that, the general public have a security knowledge that is way behind the IoT threat landscape… Story on TechRepublic
The security skills shortage is here, here’s how to prepare
The security skills shortage is here, here’s how to prepare… Story on TechRepublic
2023 Could Be a Security Nightmare. Here’s Why.
Could be a nightmare? Try WILL be a nightmare… Story on PCMag
What is VPN split tunneling and should I be using it?
A VPN is a service that protects your privacy and security by encrypting your all of your traffic and hiding your… Story on ZDNet
LinkedIn has massively cut the time it takes to detect security threats. Here’s how it did it
Protecting against phishing, malware and other cyber threats is a difficult cybersecurity challenge for any organization. Story on ZDNet
Hackers Use Trojanized Windows 10 to Infiltrate Ukrainian Government
To infiltrate the Ukrainian government, a group of hackers resorted to circulating Windows 10 installers over torrents that were secretly rigged… Story on PCMag
These hackers used Microsoft-signed malicious drivers to further their ransomware attacks
Security firms have reported that multiple hacking groups have been using drivers signed by Microsoft in a series of attacks… Story on ZDNet