BLOG
When we think of cybercriminals, many of us conjure images of dark alley bad actors navigating the inner workings of the web to steal data, ruin reputations, and wreak havoc, all for a handsome...
If you rely on TCP port 554, you’ll probably want to do a bit of reconfiguration. Last year, security researchers discovered a new version of the NAT Slipstream vulnerability that allowed...
In early January of this year (2021), Microsoft informed security expert Brian Krebs that the company found four zero-day security flaws in their Exchange Server. Those flaws were actively being...
Recently, Microsoft made an announcement regarding the particulars of Windows Server 2022, and there’s a lot to like in terms of built-in protections. That is amazing, even if you’re not...
In terms of ransoms paid, Ryuk is the most successful strain of ransomware in use today, having netted an estimated $150 million for the group behind the malicious code. According to a recent report...
Recently, researchers have discovered two new ransomware strains, dubbed “AlumniLocker” and “Humble”, both of which have very different ways of doing what they do. This...
The ongoing pandemic has impacted daily life in the United States in a number of ways, some predictable and others surprising. On the predictable side, when tens of thousands of employees were asked...
Most apps these days make use of cloud storage in order to minimize their footprint on your device. That’s good in theory, but based on new research from Zimperium, a disappointing percentage of...
One of the most frequently heard complaints about Windows has to do with aesthetics. Despite a few seemingly halfhearted attempts to modernize, significant portions of the OS looks and feels like they...