[ad_1] Google is set to improve Chrome by introducing a new "Link Preview" feature. This feature, currently in development for desktop use, could significantly change how users interact with web content. Link Preview allows users to view a small popup web page…
blog


[ad_1] A critical severity 'Super Admin' privilege elevation flaw puts over 900,000 MikroTik RouterOS routers at risk, potentially enabling attackers to take full control over a device and remain undetected. The flaw, CVE-2023-30799, allows remote attackers with an existing admin account…

[ad_1] The Cybersecurity and Infrastructure Security Agency (CISA) warned U.S. federal agencies today to secure their systems against a maximum severity authentication bypass vulnerability in Ivanti's Endpoint Manager Mobile (EPMM), formerly MobileIron Core. Tracked as CVE-2023-35078, this flaw has been…

[ad_1] VMware has addressed an information disclosure vulnerability in the VMware Tanzu Application Service for Virtual Machines (TAS for Virtual Machines) and Isolation Segment caused by logging and exposure of credentials through system audit logs. TAS for VMs helps enterprises…

[ad_1] New Mac malware dubbed "Realst" is being used in a massive campaign targeting Apple computers, with some of its latest variants including support for macOS 14 Sonoma, which is still in development. The malware, first discovered by a security…

[ad_1] New details have emerged of Decoy Dog, a largely undetected sophisticated toolkit likely used for at least a year in cyber intelligence operations, relying on the Domain Name System (DNS) for command and control activity. It's unclear who's behind…

[ad_1] Microsoft is investigating a known issue causing significant delays for Microsoft 365 customers when saving attachments in Outlook Desktop to a network share. This bug is known to affect Outlook Desktop when configured to save attachments to a network…

[ad_1] In the United States, California has traditionally dominated the privacy conversation. It changes. Now, organizations doing business in Virginia, Colorado, Utah and Connecticut must all learn and comply with new regulations. Adding a new dimension to the cost of…

[ad_1] Analysis of nearly 20 million information-stealing malware logs sold on the dark web and Telegram channels revealed that they have achieved significant infiltration in business environments. Information stealers are malicious software that steal data stored in applications such as…

[ad_1] The Norwegian National Security Authority (NSM) has confirmed that attackers used a zero-day vulnerability in Ivanti's Endpoint Manager Mobile (EPMM) solution to breach a software platform used by 12 ministries in the country. The Norwegian Security and Services Organization…
Recent Posts
- ‘Evil Telegram’ Android apps on Google Play infected 60K with spyware
- Google rolls out Privacy Sandbox to use Chrome browsing history for ads
- Microsoft Teams phishing attack pushes DarkGate malware
- The Week in Ransomware – September 8th 2023
- Notepad++ 8.5.7 released with fixes for four security vulnerabilities
Recent News
-
Hackers steal Steam accounts in new…
September 13, 2022 -
New PsExec spin-off allows hackers to…
September 13, 2022 -
Hackers hack software provider for Magento…
September 13, 2022
Work Together
Let us help you protect your business from all malware, spyware and ransomware attacks.