Unless you’re an IT Security Professional, you may never have heard of EnemyBot. It is a bit like the Frankenstein of malware threats, a botnet that has borrowed code from multiple different sources. While that’s not terribly original, it does make it dangerous. The hackers behind the code are actively …
Screencastify Issue Could Allow Someone To Steal Recorded Videos
Are you one of the legions of users making use of the Screencastify Chrome extension? It’s a fantastic Chrome extension that allows you to almost effortlessly create screencasts for a variety of purposes. Unfortunately, the web extension also suffers from a critical security vulnerability that allows attackers to take control …
New Phishing Attacks Use HTML Email Attachments
HTML attachments as an attack vector may seem a little old school. However, according to statistics compiled by Kaspersky Lab indicates that in 2022, that form of attack is not just simply still being employed, but hackers are making surprisingly regular use of it. The security company detected more than …
Update VMWare Apps Now For Critical Security Vulnerabilities
The Cybersecurity and Infrastructure Security Agency (CISA) has issued an advisory that serves as a stark warning. If you’re using VMware products that are impacted by recently disclosed critical security flaws, either patch them immediately or remove them from your network. CISA issued the dire warning because the last time …
New Phishing Attack Delivers Three Types Of Malware To Victims
Phishing campaigns get more effective the more closely they can imitate a trusted source. Recently, security researchers at Fortinet discovered evidence of a phishing campaign that specifically targets Microsoft Windows users and installs three different types of malware on the systems it manages to infect. Among other things, this campaign …
You Might Need This HP Bios Security Update
HP recently released a BIOS update to address a pair of high-severity vulnerabilities that affect a wide range of PC and notebook products offered by the company. In both cases, the vulnerabilities would allow an attacker to execute code arbitrarily and with Kernel level privileges. The two flaws are being …
Update Zyxel Products To Fix Possible Security Vulnerability
Do you use a Zyxel firewall? If so, there’s good news. The company has fixed an issue you may not have even been aware that you had. The company pushed out the fix in a silent update a little over two weeks ago, but when they implemented the push, they …
10 Facts About the Benefits of Security Awareness Training
Are you looking for an affordable, effective way to protect your company from cyberattacks and prevent a data breach? In today’s volatile cyberattack landscape, every business in every industry is at risk of a cyberattack. That means that every business needs to make sure that it’s taking a strong defensive …
New Malware Can Infect Linux, Mac, Or Windows Users
There’s a new strain of malware called SysJoker to be mindful of. It’s especially dangerous because it can target Windows, Mac or Linux systems. That makes it an equal opportunity strain. Researchers at Intezer are credited with discovering the malware in the wild in December of 2021 during an investigation …
Purple Fox Trojan Delivering Malware Via Popular Messaging App
A research team from Minerva Labs are working in conjunction with the MalwareHunterTeam. They have recently been tracking a Trojan called Purple Fox and have published a warning about it. The group behind the Trojan is now distributing their malicious code disguised as a Telegram installation file. If you’re not …