For Quick Reference, the SANS Windows Forensic Analysis Poster. Story on SANS
Author: ceadmin
Warning: This scam starts with a fake invoice. It could end with crooks stealing your data
A cyber extortion gang is using phishing emails, social engineering and network of phony call centers to scam victims… Story on ZDNet
Microsoft Defender protects Mac and Linux from malicious websites
Microsoft’s security tools aren’t just for Microsoft platforms, because attackers don’t just go after Windows… Story on TechRepublic
FTX Collapse Highlights the Cybersecurity Risks of Crypto
John Jay Ray III has worked on bankruptcy cases like Enron and Nortel. But his latest gig involves Crypto… Story on eSecurity Planet
How to change the DNS settings on your Windows PC
DNS, or Domain Name System, acts as a phone book for the internet to convert between IP address and domain name. Story on ZDNet
This sneaky ransomware gang keeps changing tactics to spread its malware
A new ransomware operation is using unusual techniques to breach networks and encrypt them with file-locking malware… Story on ZDNet
Google Cloud looks forward to confidential computing but eyes hardware changes
Protecting data in use is the short version of the goal of confidential computing. However, this initiative is more… Story on TechRepublic
Microsoft: Hackers are using this ‘concerning’ tactic to dodge multi-factor authentication
Microsoft has outlined several mitigations to protect against attacks on multi-factor authentication that will unfortunately make life more difficult… Story on ZDNet
Study: Almost 50% of macOS malware only comes from one app
Elastic Security Labs has recently released its 2022 Report Story on Neowin
Researchers Quietly Cracked Zeppelin Ransomware Keys
>Peter is an IT manager for a technology manufacturer that got hit with a Russian ransomware strain called Zeppelin in May 2020. Story on Krebs On Security