news

News

Tor switches to new Counter Galois Onion relay encryption algorithm

Tor has announced improved encryption and security for the circuit traffic by replacing the old tor1 relay encryption al...
News

Year-end approaches: How to maximize your cyber spend

December budget conversations follow a predictable pattern. You have unspent funds, a list of security gaps, and pressur...
News

Code beautifiers expose credentials from banks, govt, tech orgs

Thousands of credentials, authentication keys, and configuration data impacting organizations in sensitive sectors have ...
News

Dartmouth College confirms data breach after Clop extortion attack

​Dartmouth College has disclosed a data breach after the Clop extortion gang leaked data allegedly stolen from the schoo...
News

Malicious Blender model files deliver StealC infostealing malware

A Russian-linked campaign delivers the StealC V2 information stealer malware through malicious Blender files uploaded to...
News

ClickFix attack uses fake Windows Update screen to push malware

ClickFix attack variants have been observed where threat actors trick users with a realistic-looking Windows Update anim...
News

Real-estate finance services giant SitusAMC breach exposes client data

SitusAMC, a company that provides back-end services for top banks and lenders, disclosed on Saturday a data breach it ha...
News

Shai-Hulud malware infects 500 npm packages, leaks secrets on GitHub

Hundreds of trojanized versions of well-known packages such as Zapier, ENS Domains, PostHog, and Postman have been plant...
News

SCCM and WSUS in a Hybrid World: Why It’s Time for Cloud-native Patching

Author: Gene Moody, Field CTO at Action1 For many IT leaders, the warning signs appeared gradually: devices slipping out...