25 years on, Microsoft makes another stab at stopping macro malware
Bravo to Microsoft, because it sounds like they’re doing something to improve the security of Office users. Way back in 1995, Microsoft accidentally shipped a...
If NFTs were honest…
If you don't understand what they are, don't feel too bad about it. The truth is that many people don't understand what NFTs are. It's...
DSA-5078 zsh – security update
It was discovered that zsh, a powerful shell and scripting language, did not prevent recursive prompt expansion. This would allow an attacker to execute arbitrary...
ShadowPad has become the RAT of choice for several state-sponsored Chinese APTs
The ShadowPad malware came into the spotlight in 2017 when it was used in two software supply-chain attacks by a suspected Chinese state-sponsored hacker group....
Trousseau bolsters its Kubernetes security capabilities with support for HashiCorp Vault
The project managers of an open-source plug-in for Kubernetes that allows the orchestration software to better use encryption to protect its secrets has announced support...
Marine Charged with Cyber-Stalking
US Marine accused of waging cyber sextortion campaign against young women in California Read More
Internet Society Data Leaked
Unsecured data of 80,000 ISOC members discovered on Microsoft Azure blob repository Read More
Secret CIA Data Collection Program
Two US Senators claim that the CIA has been running an unregulated — and almost certainly illegal — mass surveillance program on Americans. The senator’s...
Log4Shell: A Tale of Two Detection Techniques
Endpoint detection and response (EDR) can only take you so far in identifying Log4j exploit attempts. Here’s why dynamic checks are needed to uncover vulnerable...
Barclays: Scams Surged in Final Quarter of 2021
Reported scams surged by 17% in the final quarter of 2021 in the UK, while attempted scams increased by 70% over the same period Read...
