A new strain of ransomware dubbed ShrinkLocker is being used by cyberattackers to target enterprise computers. It exploits the Microsoft BitLocker encryption Story on TechRepublic
Month: May 2024
A massive Microsoft outage is impacting Bing, Copilot, ChatGPT, and DuckDuckGo
An apparent Microsoft outage has impacted a slew of services, including Bing, the company’s artificial intelligence assistant Copilot… Story on ZDNet
Google: Stop Trying to Trick Employees With Fake Phishing Emails
According to a Google security manager, simulated phishing tests are outdated and more likely to cause resentment among employees than improve their security practices Story on PCMag
Google: Microsoft Is Unable to Keep Customers Safe From Cyberattacks
Google criticizes Microsoft’s cybersecurity failures and argues Microsoft may not be able to prevent future breaches Story on PCMag
Black Basta Ransomware Struck More Than 500 Organizations Worldwide
A joint cybersecurity advisory from the Federal Bureau of Investigation, Cybersecurity and Infrastructure Security Agency, Department of Health and Human… Story on TechRepublic
Are all Linux vendor kernels insecure? A new study says yes, but there’s a fix
In a new white paper, Vendor Kernels, Bugs and Stability, the infrastructure software and Rocky Linux company CIQ presents… Story on ZDNet
RSAC: 4 Things We Learned About AI, Hackers, and Securing Our Data
The annual RSA Conference is nearly San Francisco’s biggest yearly trade show. Story on PCMag
How Can Businesses Defend Themselves Against Cyberthreats?
Today, all businesses are at risk of cyberattack, and that risk is constantly growing. Digital transformations are resulting in more sensitive and valuable data… Story on TechRepublic
Connect to your Raspberry Pi from a web browser, anywhere in the world – here’s how
The remote desktop tool that Raspberry Pi fans have been waiting for is finally here. Here’s what you need to know to access it. Story on ZDNet
Does TunnelVision Threat Put ‘Virtually All VPN Apps’ at Risk? Not Exactly
Several VPN providers say they already have safeguards to stop the ‘TunnelVision’ technique from leaking users’ VPN traffic. Leviathan Security says it’s still possible even with a firewall. Story on PCMag