. Common methods AD administrators use to protect their environments can easily be exploited. Here’s how. No matter how many tools you buy or how many alerts flood the SOC, your security strategy is only as strong as its administration. If attackers ca…Continue Reading
Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, the FBI warned U.S. banks of a wide-scale cybercrime campaign called “ATM cash-out,” in which h…Continue Reading
I wrote this article to help you remove Feedgeo.com. This Feedgeo.com removal guide works for Chrome, Firefox and Internet Explorer. You recently started to get bombarded by numerous intrusive advertisements that are suspiciously related to what you’ve…Continue Reading
The start of the year seemed to open with a bang on the cybersecurity news front. The Spectre and Meltdown vulnerabilities made headlines with fears that they could be as bad, if not worse, than the previous Heartbleed vulnerability that made its mark …Continue Reading
#1225762: Analysis of the CVE-2018-8373 0day vulnerability attack related to the Darkhotel gang. On August 15, 2018, cybersecurity company Trend Micro disclosed an in-the-day 0day vulnerability attack that it captured in July this year. The attack expl…Continue Reading
This week, we discuss a new flaw affecting Intel processors, a $13.5 million cyber attack on an Indian bank, the release of version 1.3 of the Transport Layer Security protocol and the highlights from this month’s Microsoft patches.
Hello and welcome …Continue Reading
In this podcast recorded at Black Hat USA 2018 , Chris Carlson, VP of Product Management, Cloud Agent Platform at Qualys , talks about endpoint breach prevention by reducing attack surfaces.
Here’s a transcript of the podcast for your convenience. Wel…Continue Reading
The newly revealed Intel L1 Terminal Fault vulnerability, also known as Foreshadow, provides a new round of challenges for system administrators who must now find ways to protect their organization’s computers against what could be serious attacks. Int…Continue Reading
#1225691: Internet Explorer users actively attacked through zero-day exploit for at least a month. For at least a month, Internet Explorer users have been actively attacked through a zero-day vulnerability in their browser. Through the vulnerability an…Continue Reading
Trickbot has been around since 2016 – but a new variant of the infamous financial trojan has caught the eyes of researchers with a stealthy code-injection technique. Researchers at Cyberbit this week said that they have found a new Trickbot iteration t…Continue Reading