Fix Your On-Premises Exchange Servers Urgently – Microsoft Recommends

Microsoft “strongly” advises users to maintain their Exchange servers up to date and take precautions such as enabling Windows Extended Protection and configuring the certificate-based…


0 Comments5 Minutes

Hive Ransomware Taken Down in FBI’s Hacking Operative

In July, the FBI confiscated the group’s infrastructure as part of an international law enforcement operation, including their Tor payment and data leak sites. Six months of covert…


0 Comments5 Minutes

Why is Email Such a Hot Commodity for Hackers?

Email is our most effective productivity tool. That is why phishing poses such a risk to everyone. We’re encouraged to look for warning signs of phishing attempts, but it isn’t easy when…


0 Comments7 Minutes

Hackers Spreading Malware using Microsoft OneNote Attachments

Threat actors are increasingly using OneNote attachments in phishing emails to infect users with remote access malware that can be used to install other software, steal passwords or even…


0 Comments6 Minutes

WhatsApp Fined €5.5 Million for Violating Data Protection Laws

On Thursday, the Irish Data Protection Commission (DPC) fined WhatsApp, a Meta company, €5.5 million for breaching data protection rules when processing users’ personal information. The…


0 Comments5 Minutes

Norton Password Manager Hack Affects Nearly 1 Million Users

Norton Password Manager & Norton LifeLock, a company that says it will keep you safe online, found that an unauthorized third party was trying to log into many customer accounts. The company is…


0 Comments5 Minutes

The Rise of Quantum Computing and Its Impact on Cybersecurity

According to a recent Zapata Computing analysis, organizations’ commitment is growing, indicating a developing market with broad, worldwide interest and greater urgency surrounding post-quantum…


0 Comments6 Minutes

Industrial Control Systems from Major Manufacturers May Have Flaws, CISA Warns

Sewio, InHand Networks, Sauter Controls, and Siemens products are all affected by severe security issues, according to several Industrial Control Systems (ICS) warnings published by the U.S.…


0 Comments4 Minutes

What exactly is LockBit ransomware and how does it work?

The LockBit ransomware operation has once again dominated headlines, as we learned that they were responsible for the UK’s Royal Mail attack. Royal Letter is the United Kingdom’s leading…


0 Comments2 Minutes

Microsoft Macros Explained: A Blessing and a Curse

Macros force people to choose between productivity and security. On the one hand, macros save end users a lot of time by automating repetitive processes. But on the other hand, it is very easy for…


0 Comments7 Minutes