A threat group based in Israel is behind attacks in recent weeks, according to a report from email security firm… Story on TechRepublic
Category: Cybersecurity
Hackers Try to Install Ransomware at Cybersecurity Firm Dragos
What happens when a hacker tries to break into a cybersecurity provider? One such company, Dragos, is disclosing a recent encounter… Story on PCMag
The Problem of Old Vulnerabilities and What to Do About It
As a general rule, IT departments are focused on the next threat: the zero-day vulnerabilities lurking in the system, the trapdoors hidden from view… Story on Dark Reading
Ransomware Attack on Dallas Shuts Down the City’s Online Services
A ransomware attack has ensnared the city of Dallas, shutting down online and IT services at the municipal government, including local police… Story on PCMag
8 habits of highly-secure remote workers
The pandemic permanently transformed many aspects of our everyday lives, including the workplace. Working remotely has become more… Story on ZDNet
ChatGPT and the new AI are wreaking havoc on cybersecurity in exciting and frightening ways
Generative artificial intelligence is transforming cybersecurity, aiding both attackers and defenders. Cybercriminals are harnessing AI to launch sophisticated… Story on ZDNet
Google: Passkeys Log You In Much Faster Than Passwords (Trust Us)
Still unsure about passkeys, the tech industry’s latest attempt to kill the password? Google has released some rare data, showing that… Story on PCMag
Microsoft Patches Serious Azure Cloud Security Flaws
Microsoft has patched three vulnerabilities in its Azure cloud platform that could have allowed attackers to access sensitive info on a targeted service… Story on Dark Reading
Google’s 2FA app update lacks end-to-end encryption, researchers find
On April 25, security researchers Tommy Mysk and Talal Haj Bakry, who are known collectively on Twitter as Mysk, warned users of Google… Story on TechRepublic
InfoBlox discovers rare Decoy Dog C2 exploit
If you do a search for the most recent reports on Domain Name System attacks, you may have a hard time finding one… Story on TechRepublic