Latest Articles
VPNLab Shut Down by Europol
Cyber miscreants' preferred VPN service, VPNLab. net, has been shut down. Europol put the kibosh on VPNLab earlier this week.
Apple Safari Bug Allows for Web User Tracking
Apple Safari users should be aware that the browser has an unpatched bug that permits cross-site user tracking. The bug is present within the IndexedDB API of Apple Safari 15.
Cybersecurity Weekly Recap - January 14th
The digital attacks on businesses, governments, and other organizations continue to escalate as we transition to the second half of January.
Maryland Health Department Hit by Ransomware Attack
A ransomware attack has struck Maryland's Health Department. The department is attempting to mitigate IT service outages, yet the process is plodding along at a slow pace.
Grass Valley CA Hit by Cyber Attack
Grass Valley, a city in California, has been hit by a cyber-attack. The attack exfiltrated financial data and personal information pertaining to vendors that do business with the city, employees of the city, dependents of those employees, and even the spouses of city employees.
An Inside Look at Chinese Hackers’ Night Sky Ransomware
A hacking collective in China is distributing Night Sky ransomware through Log4j exploits. Microsoft has been closely analyzing the crypto-locking malware to identify its source point, characteristics, and potential lines of defense.
USB Kernel Bug Exposes Routers to RCE
Millions of popular routers have been exposed to RCE in recent weeks. RCE is an acronym that stands for remote code execution.
An Inside Look at Norton 360’s Built-in Cryptomining Tool
Norton 360 users should be aware the company's antivirus software contains a cryptomining tool. There has been a public outcry for the company to remove the cryptomining component as it chews up electricity and memory.
Malware is Prompting Fake Shutdowns on iPhones
A new version of malware is forcing the fake shutdown of iPhones, providing an opportunity for hackers to spy on users secretly.
Cyber Security Researchers Identify Financial Theft Hackers
A group of cyber security specialists has figured out who is behind a sizable financial theft hacking operation. The hackers went to great lengths to conceal their identities.
Microsoft’s E-Signature Verification Exploited by Malsmoke
Malsmoke, a hacking collective, is administering a campaign to steal information. The data theft is performed with the use of ZLoader malware.
Apple iOS Users Should be Aware of the “DoorLock” HomeKit Bug
Apple's iOS mobile operating system contains a DoS vulnerability. DoS is short for denial-of-service. This bug can cause targeted devices to either reboot over and over again or completely crash when synced up with an appliance that is Apple Home-compatible.