Category: News

Apple: CSAM Image-Detection Backdoor ‘Narrow’ in Scope

Computing giant tries to reassure users that the tool won’t be used for mass surveillance.

How to Reduce Exchange Server Downtime in Case of a Disaster?

Exchange downtime can have serious implications on businesses. Thus, it’s important to maintain backups and implement best practices for Exchange servers that can help restore the Exchange server when a…
Read more

Phishing Costs Nearly Quadrupled Over 6 Years

Lost productivity & mopping up after the costly attacks that follow phishing – BEC & ransomware in particular – eat up most costs, not payouts to crooks.

Critical Valve Bug Lets Gamers Add Unlimited Funds to Steam Wallets

Valve plugs an API bug found in its Steam platform that that abused the Smart2Pay system to add unlimited funds to gamer digital wallets.

XSS Bug in SEOPress WordPress Plugin Allows Site Takeover

The bug would allow a number of malicious actions, up to and including full site takeover. The vulnerable plugin is installed on 100,000 websites.

100m T-Mobile Customer Records Purportedly Up for Sale

The seller claims to have sucker-punched U.S. infrastructure out of retaliation. The offer: 30m records for ~1 penny each, with the rest being sold privately.

Amazon’s Plan to Track Worker Keystrokes: A Sign of Controls to Come?

Data theft, insider threats and imposters accessing sensitive customer data have apparently gotten so bad inside Amazon, the company is considering rolling out keyboard-stroke monitoring for its customer-service reps. A…
Read more

Cyberattackers Embrace CAPTCHAs to Hide Phishing, Malware

CAPTCHA-protected malicious URLs are snowballing lately, researchers said.

SolarWinds 2.0 Could Ignite Financial Crisis – Podcast

That’s what NY State suggests could happen, given the utter lack of cybersec protection at many private equity & hedge fund firms. Can AI help avert it?

Exchange Servers Under Active Attack via ProxyShell Bugs

There’s an entirely new attack surface in Exchange, a researcher revealed at Black Hat, and threat actors are now exploiting servers vulnerable to the RCE bugs.