26 May US govt contractor ABB confirms ransomware attack, data theft Swiss tech multinational and U.S. government contractor ABB has confirmed that some of its systems were impacted by a ransomware attack, previously described by the company as “an IT security incident.” […]
26 May Emby shuts down user media servers hacked in recent attack Emby says it remotely shut down an undisclosed number of user-hosted media server instances that were recently hacked by exploiting a previously known vulnerability and an insecure admin account configuration. […]
26 May Mozilla stops Firefox fullscreen VPN ads after user outrage Firefox users have been complaining about very intrusive full-screen advertisements promoting Mozilla VPN displayed in the web browser when navigating an unrelated page. […]
26 May BlackByte ransomware claims City of Augusta cyberattack The city of Augusta in Georgia, U.S., has confirmed that the most recent IT system outage was caused by unauthorized access to its network. […]
25 May Windows 11 finally gets a ‘never combine taskbar buttons’ mode Microsoft has released a new Windows 11 dev build that adds a long-awaited feature allowing users to ensure that all windows are shown as individual items in the taskbar. […]
25 May Predator: Looking under the hood of Intellexa’s Android spyware Security researchers at Cisco Talos and the Citizen Lab have presented a new technical analysis of the commercial Android spyware ‘Predator’ and its loader ‘Alien,’ sharing its data-theft capabilities and other operational details. […]
25 May Microsoft 365 phishing attacks use encrypted RPMSG messages Attackers are now using encrypted RPMSG attachments sent via compromised Microsoft 365 accounts to steal Microsoft credentials in targeted phishing attacks designed to evade detection by email security gateways. […]
25 May D-Link fixes auth bypass and RCE flaws in D-View 8 software D-Link has fixed two critical-severity vulnerabilities in its D-View 8 network management suite that could allow remote attackers to bypass authentication and execute arbitrary code. […]
25 May New Russian-linked CosmicEnergy malware targets industrial systems Mandiant security researchers have discovered a new OT known as CosmicEnergy that targets operational technology (OT), raising concerns about potential disruptions to electric power systems worldwide. […]
25 May What’s a Double-Blind Password Strategy and When Should It Be Used Strategies such as the double-blind password strategy can be effective, but only if end-users are fully adopting the practice. Learn more about when and how to use it. […]