News

0 Comments
Drupal, the popular open-source content management system, has released security updates to address multiple “moderately critical” vulnerabilities in Drupal Core that could allow remote attackers to compromise the security of hundreds of thousands of websites. According to the advisories published today by the Drupal developers, all security vulnerabilities Drupal patched this month reside in third-party
0 Comments
Microsoft warned users of its web email services that accounts may have been compromised, and some sensitive data may have been accessed. Beginning late Friday, Microsoft sent email messages to users of Outlook, Hotmail and MSN Mail, alerting them that an unauthorized third party gained partial access to Microsoft-managed accounts between Jan. 1 and March
0 Comments
Even after Google’s security oversight over its already-huge Android ecosystem has evolved over the years, malware apps still keep coming back to Google Play Store. Sometimes just reposting an already detected malware app from a newly created Play Store account, or using other developers’ existing accounts, is enough for ‘bad-faith’ developers to trick the Play
0 Comments
Matrix—the organization behind an open source project that offers a protocol for secure and decentralized real-time communication—has suffered a massive cyber attack after unknown attackers gained access to the servers hosting its official website and data. Hackers defaced Matrix’s website, and also stole unencrypted private messages, password hashes, access tokens, as well as GPG keys
0 Comments
Zero trust may seem like just another security buzzword, but organizations are increasingly finding reasons to take the zero trust approach to network security. In the early days of the internet, network security professionals borrowed medieval terminology to describe network defenses: Moats, bastion hosts, perimeters, firewalls and gateways all figured into the network defender’s vocabulary.
0 Comments
If you have an account with Microsoft Outlook email service, there is a possibility that your account information has been compromised by an unknown hacker or group of hackers, Microsoft confirmed. Earlier this year, hackers managed to breach Microsoft’s customer support portal and access information related to some email accounts registered with the company’s Outlook
0 Comments
Yes, you read that right! Russia has fined Facebook with 3,000 rubles, roughly $47, for not complying with the country’s controversial Data Localization law. It’s bizarre and unbelievable, but true. In December last year, Russian Internet watchdog Roskomnadzor sent notifications to Twitter and Facebook asking them to provide information about the location of servers that
0 Comments
As endpoint threats become more sophisticated and abundant, so does the need for more advanced endpoint security tools. An organization can improve the security of its endpoints — including laptops, desktop PCs, mobile devices and servers in the data center — by using software that can rapidly detect, analyze, block and contain in-progress attacks. These
0 Comments
Microsoft today finally released the first new reborn version of its Edge browser that the company rebuilds from scratch using Chromium engine, the same open-source web rendering engine that powers Google’s Chrome browser. However, the Chromium-based Edge browser builds haven’t yet entered the stable or even the beta release; instead, Microsoft has released two testing-purpose
0 Comments
Phishing scams and cyberattacks are on the rise, resulting in millions of dollars in company losses with every successful attempt. Hackers break in through a company network and gain access to all connected endpoints. Endpoint devices are internet-capable computer hardware devices on a TCP/IP network and include desktop computers, tablets and thin clients. As the
0 Comments
Security researchers found evidence that a Pipdig WordPress plugin contained suspicious code. Although Pipdig denied any wrongdoing, the company removed the questionable code from its plugin and repositories. Pipdig makes custom themes for WordPress and Blogger, as well as the Pipdig Power Pack (P3) WordPress plugin, which is installed by default along with any WordPress
0 Comments
BOSTON — Cybersecurity professionals are increasingly being asked to take on data privacy responsibilities as part of their job function, research from the Information Systems Security Association and analyst firm Enterprise Strategy Group revealed. The study surveyed 267 cybersecurity professionals, mostly from North America, and 40% of respondents claimed data privacy is a “significantly” new
0 Comments
IT administrators must walk the tightrope between locking down their systems and finding ways to manage those machines without tripping over internal controls. Microsoft offers a number of security-based technologies to help IT workers who need admin privileges correct many issues, such as Just Enough Administration and bastion forests. But these restrictions tend to be
0 Comments
Hackers yesterday stole nearly $19 million worth of cryptocurrency from Bithumb, the South Korea-based popular cryptocurrency exchange admitted today. According to Primitive Ventures’ Dovey Wan, who first broke the information on social media, hackers managed to compromise a number of Bithumb’s hot EOS and XRP wallets and transferred around 3 million EOS (~ $13 million)
0 Comments
A security researcher today publicly disclosed details and proof-of-concept exploits for two ‘unpatched’ zero-day vulnerabilities in Microsoft’s web browsers after the company allegedly failed to respond to his responsible private disclosure. Both unpatched vulnerabilities—one of which affects the latest version of Microsoft Internet Explorer and another affects the latest Edge Browser—allow a remote attacker to