Cybersecurity News
WhatsApp backtracks on app limitations if you refuse new privacy terms
App functionality will not be restricted if you refuse.03 June 2021
Securing Your Wi-Fi Access Point
The first step to creating a cybersecure home is to start by securing your Wi-Fi Access Point. Change your Wi-Fi Access Points default administrator password to something only you know. Many Wi-Fi Access Points or Wi-Fi routers are shipped with default administrator passwords that are publicly known and posted on the Internet.03 June 2021
Phishing Emails Remain in User Inboxes Over 3 Days Before They're Removed
Most malicious emails get blocked, but the ones that get through linger around dangerously long, a new study shows.02 June 2021
FireEye Sells Products Business to Symphony Group for $1.2B
The transaction will include the FireEye brand name; the business that remains will be called Mandiant Solutions.02 June 2021
Encryption Helps Companies Avoid Breach Notifications
With nearly twice as many firms suffering a breach compared with the previous year, limiting the damage becomes more important, a survey finds.02 June 2021
Podcast: The State of Ransomware

02 June 2021
Effective Adoption of SASE in 2021

02 June 2021
Banking Attacks Surge Along with Post-COVID Economy

02 June 2021
Microsoft Buys ReFirm Labs to Drive IoT Security Efforts
The acquisition will bring ReFirm's firmware analysis capabilities alongside Microsoft's Azure Defender for IoT to boost device security.02 June 2021
A View from Inside a Deception

02 June 2021
Wordpress Discloses Critical Zero-day in Fancy Product Designer Plugin
The plugin under active attack has been installed on more than 17,000 websites, Wordpress reports.02 June 2021
Wordpress Discloses Critical Zero-day in Fancy Product Designer Plugin
The plugin under active attack has been installed on more than 17,000 websites, Wordpress reports.02 June 2021
Is Your Adversary James Bond or Mr. Bean?
Especially with nation-state attacks, its critical to assess whether you're up against jet fighter strength or a bumbler who tries to pick locks.02 June 2021
Microsoft 365: Most Common Threat Vectors & Defensive Tips

02 June 2021
REvil Ransomware Ground Down JBS: Sources

02 June 2021
Chaos for the Sake of Chaos? Yes, Nation-States Are That Cynical
Many nation-state-backed attacks are intended to destabilize the US government, not steal from it.02 June 2021
Processor Morphs Its Architecture to Make Hacking Really Hard
Researchers create a processor that uses encryption to modify its memory architecture during runtime, making it very difficult for hackers to exploit memory-based vulnerabilities.02 June 2021
This is how attackers bypass Microsoft's AMSI anti-malware scanning protection
Researchers outline common tactics for circumventing the security software.02 June 2021
DoJ Charges Rhode Island Woman in Phishing Scheme Against Politicians

02 June 2021
XSS vulnerability found in popular WYSIWYG website editor
The security flaw was found in how HTML sanitizing is performed.02 June 2021