Skip to content
Totally Consultants
Menu
  • Totally
  • Latest
  • Login
  • Contact
  • Privacy Policy
Menu

Month: February 2024

New Vulnerabilities in ConnectWise ScreenConnect Massively Exploited by Attackers

Posted on February 28, 2024 by ceadmin

  Two new vulnerabilities impact ConnectWise ScreenConnect, remote desktop and access software used for support: CVE-2024-1709 and CVE-2024-1708, with the former… Story on TechRepublic  

Continue reading

CrowdStrike 2024 Global Threat Report: 6 Key Takeaways

Posted on February 28, 2024 by ceadmin

  Highlights from CrowdStrike’s 2024 report: Identity-based and social engineering attacks still take center stage. Cloud-environment intrusions have increased… Story on TechRepublic  

Continue reading

Why ChatGPT answered queries in gibberish on Tuesday

Posted on February 23, 2024 by ceadmin

  ChatGPT goes colorfully crazy. We all know that OpenAI’s ChatGPT can make mistakes. They’re called hallucinations… Story on ZDNet  

Continue reading

AT&T: Widespread Outages Not Due to Cyberattack

Posted on February 23, 2024 by ceadmin

  AT&T blames an ‘incorrect process’ that occurred while the cell phone carrier was expanding its network. Government agencies are investigating. Story on PCMag  

Continue reading

LockBit Ransomware Gang’s Website Shut Down by FBI and International Law Enforcement

Posted on February 22, 2024 by ceadmin

  The U.K. National Crime Agency’s Cyber Division, the FBI and international partners have cut off ransomware threat actors’ access to LockBit’s website… Story on TechRepublic  

Continue reading

FBI Disinfects Ubiquiti Routers Exploited by Russian Government Hackers

Posted on February 17, 2024 by ceadmin

  The Kremlin’s notorious ‘Fancy Bear’ hacking group gained access to the routers by working with another Russian cybercriminal gang, the FBI says Story on PCMag  

Continue reading

This iOS Trojan Is Harvesting Facial-Recognition Data

Posted on February 17, 2024 by ceadmin

  ‘GoldPickaxe’ malware circulating in Southeast Asia is designed to steal facial recognition data, likely because banks and government agencies there are adopting biometric scans Story on PCMag  

Continue reading

How to Hack Wi-Fi Passwords

Posted on February 16, 2024 by ceadmin

  Chances are you have a Wi-Fi network at home. But maybe you forgot the password, or you don’t have neighbors willing to share their Wi-Fi goodness Story on PCMag  

Continue reading

Google Threat Analysis Group’s Spyware Research: How CSVs Target Devices and Applications

Posted on February 16, 2024 by ceadmin

  A new publication from Google’s Threat Analysis Group focuses on commercial surveillance vendors, whose services are bought by governments for monitoring or… Story on TechRepublic  

Continue reading

5 Ways to Detect Text Written by ChatGPT and Other AI Tools

Posted on February 16, 2024 by ceadmin

  Can you spot ChatGPT-generated text? The immensely popular AI is being used in emails, cover letters, marketing pitches, college essays, coding, and even some… Story on PCMag  

Continue reading
  • 1
  • 2
  • Next
  • Starlink Quietly Adds Two-Factor Authentication to Stop Account Hijackings
  • What Is Stalkerware? How to Find and Remove It
  • Why Did CrowdStrike Update Only Hit Windows? Blame the EU, Microsoft Says
  • Massive Microsoft Windows Outage Bricks PCs, Halts Flights Worldwide
  • CrowdStrike causes Windows outage chaos for airports, banks, and more. Here’s what you can do
No comments to show.
  • Totally
  • Latest
  • Login
  • Contact
  • Privacy Policy
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • AI
  • Apple
  • Blockchain
  • Cloud
  • Cybersecurity
  • Development
  • Foundation
  • General
  • Linux
  • Malware
  • MFA
  • Not-Me
  • Personal
  • Phishing
© 2025 Totally Consultants | Powered by Minimalist Blog WordPress Theme