ALL POSTS CISA calls for urgent action against critical threats Pieter Arntz January 21, 2022 0 Comments In a CISA Insights bulletin the Cybersecurity & Infrastructure Security Agency (CISA) warns that every organization in the United States is… Update now! Chrome patches critical RCE vulnerability in Safe Browsing Pieter Arntz January 20, 2022 0 Comments Google has issued an update for the Chrome browser which includes 26 security fixes. What stands out is that one of… Steer clear of gift card balance scams Christopher Boyd January 20, 2022 0 Comments Rogue ads are a problem-causing menace which can strike in many ways. Malvertising often uses a combination of exploits to drop… Red Cross begs attackers to “Do the right thing” after family reunion service compromised Christopher Boyd January 20, 2022 0 Comments Restoring Family Links is a program most commonly associated with The Red Cross. It’s been around since 1870, and aims to… Open Subtitles breach: The dangers of password reuse Christopher Boyd January 20, 2022 0 Comments Popular website Open Subtitles has been breached. The impact so far: almost seven million accounts “breached and ransomed” back in August.There’s… Combatting SMS and phone fraud: UK government issues guidance Pieter Arntz January 20, 2022 0 Comments The UK’s National Cyber Secuity Centre (NCSC) has published a guide to help make your organization’s SMS and telephone messages effective… Mac users, update now! “Powerdir” flaw could allow attackers to spy on you Jovi Umawing January 19, 2022 0 Comments If you have been forgoing updating your Mac, this article might make you think twice. The Microsoft 365 Defender Research Team… Cybercriminals’ friend VPNLab.net shut down by law enforcement Pieter Arntz January 19, 2022 0 Comments Europol has announced that law enforcement has seized or disrupted the 15 servers that hosted VPNLab.net’s service, rendering it no longer… Campaign launched to delay social media end-to-end encryption Malwarebytes Labs January 19, 2022 0 Comments The many issues surrounding end-to-end encryption (E2EE) are ever-present. They usually spring up when something that could potentially affect the safety… Previous 1 … 257 258 259 260 261 … 619 Next Contributors Threat Center Podcast Glossary Scams