Ukrainian govt networks breached via trojanized Windows 10 installers December 15, 2022 […] Read More… from Ukrainian govt networks breached via trojanized Windows 10 installers
These hackers used Microsoft-signed malicious drivers to further their ransomware attacks December 15, 2022 […] Read More… from These hackers used Microsoft-signed malicious drivers to further their ransomware attacks
CISA Warns Veeam Backup & Replication Vulnerabilities Exploited in Attacks December 14, 2022 […] Read More… from CISA Warns Veeam Backup & Replication Vulnerabilities Exploited in Attacks
Microsoft digital certificates have once again been abused to sign malware December 13, 2022 […] Read More… from Microsoft digital certificates have once again been abused to sign malware
New Windows malware also steals data from victims’ mobile phones November 30, 2022 […] Read More… from New Windows malware also steals data from victims’ mobile phones
New attacks use Windows security bypass zero-day to drop malware November 19, 2022 […] Read More… from New attacks use Windows security bypass zero-day to drop malware
Microsoft patches 62 vulnerabilities, including Kerberos, and Mark of the Web, and Exchange…sort of November 8, 2022 […] Read More… from Microsoft patches 62 vulnerabilities, including Kerberos, and Mark of the Web, and Exchange…sort of
Critical Vulnerability in Microsoft Azure Cosmos DB Opens Up Jupyter Notebooks November 2, 2022 […] Read More… from Critical Vulnerability in Microsoft Azure Cosmos DB Opens Up Jupyter Notebooks
Unofficial Patch Released for New Actively Exploited Windows MotW Vulnerability October 31, 2022 […] Read More… from Unofficial Patch Released for New Actively Exploited Windows MotW Vulnerability
Hackers use Microsoft IIS web server logs to control malware October 28, 2022 […] Read More… from Hackers use Microsoft IIS web server logs to control malware