Vulnerabilities

FBI Clears ProxyLogon Web Shells from Hundreds of Orgs

In a veritable cyber-SWAT action, the Feds remotely removed the infections without warning businesses beforehand. Source link

A Post-Data Privacy World and Data-Rights Management

The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal...

100,000 Google Sites Used to Install SolarMarket RAT

Search-engine optimization (SEO) tactics direct users searching for common business forms such as invoices, receipts or other templates to hacker-controlled Google-hosted domains. Source link...

Microsoft Has Busy April Patch Tuesday with Zero-Days, Exchange Fixes

Microsoft fixes 110 vulnerabilities, with 19 classified as critical and another flaw under active attack. Source link

How the NAME:WRECK Bugs Impacts Consumers, Businesses

How this class of vulnerabilities will impact millions connected devices and potentially wreck the day of IT security professionals. Source link

COVID-Related Threats, PowerShell Attacks Lead Malware Surge

Researchers measured 648 new malware threats every minute during Q4 2020.   Source link

Tax Phish Swims Past Google Workspace Email Security

Crooks are looking to harvest email credentials with a savvy campaign that uses the Typeform service to host the phishing page. Source link

Adobe Patches Slew of Critical Security Bugs in Bridge, Photoshop

The security bugs could open the door for arbitrary code-execution and full takeover of targeted machines. Source link

Chrome Zero-Day Exploit Posted on Twitter

An update to Google’s browser that fixes the flaw is expected to be released on Tuesday. Source link

Latest articles

What to consider when shopping for cyber insurance

Cyber insurance is gaining favor in the business world. An expert offers tips on how...

BazarLoader Malware Abuses Slack, BaseCamp Clouds

Two cyberattack campaigns are making the rounds using unique social-engineering techniques. Source link

Update to REvil ransomware changes Windows passwords to automate file encryption via Safe Mode

The ransomware changes the device password to "DTrump4ever" and forces the device to log in...

iOS Kids Game Morphs into Underground Crypto Casino

A malicious ‘Jungle Run’ app tricked security protections to make it into the Apple App Store, scamming users out of money with...