
New Ransomware Strains Have Researchers On Their Toes
Recently, researchers have discovered two new ransomware strains, dubbed “AlumniLocker” and “Humble”, both of which have very different ways of doing what they do. This highlights the ongoing development and
New Ryuk Ransomware Function Spreads Across Networks Quickly
In terms of ransoms paid, Ryuk is the most successful strain of ransomware in use today, having netted an estimated $150 million for the group behind the malicious code. According
New Windows Server 2022 Includes Security Improvements
Recently, Microsoft made an announcement regarding the particulars of Windows Server 2022, and there’s a lot to like in terms of built-in protections. That is amazing, even if you’re not
Now Hackers Are Attacking Exchange Server Vulnerabilities
In early January of this year (2021), Microsoft informed security expert Brian Krebs that the company found four zero-day security flaws in their Exchange Server. Those flaws were actively being
Internet Browsers Blocking Some Ports Due To Security Vulnerabilities
If you rely on TCP port 554, you’ll probably want to do a bit of reconfiguration. Last year, security researchers discovered a new version of the NAT Slipstream vulnerability that
Another Malware Evolves To Gain Access To More Systems
One of the more disturbing trends this year is that worms are becoming popular among the hackers of the world again. We’ve seen a handful of new malware strains introduced
Be Careful Downloading Clubhouse App On Android
Clubhouse has taken the internet by storm. Or rather, it has taken the iOS ecosystem by storm, since the company has yet to release an Android version of their increasingly
Facebook Adding Physical Security Key Support For Mobile Devices
Many industry insiders consider physical security keys used in the context of two-factor authentication login schemes to be the final word in digital security. That is because even if your
Hackers Are Using Unpatched NAS Devices To Mine Bitcoin
In late 2020, QNAP discovered a pair of critical security vulnerabilities that would allow hackers to take remote control over network attached storage devices (NAS). In this particular instance, the