Threat Actors Pivot Around Microsoft’s Macro-Blocking in Office | Threatpost
Threat actors are finding their way around Microsoft’s default blocking of macros in its Office suite, using alternative files to host malicious payloads now that Read More
Threat actors are finding their way around Microsoft’s default blocking of macros in its Office suite, using alternative files to host malicious payloads now that Read More
A software vulnerability is a weakness in an operating system or application that can be exploited by an attacker to invade an IT network. When Read More
Cybercriminals are tapping the built-in services of popular messaging apps like Telegram and Discord as ready-made platforms to help them perform their nefarious activity in Read More
While data breaches and ransomware are still considered among the more significant concern for businesses, the threats sometimes come from a direction we weren’t expecting. Read More
The Biden administration on Thursday issued updated cybersecurity requirements for big US pipeline operators that give them more flexibility over what cyber defensive measures they Read More
The US Justice Department seized approximately half a million dollars that North Korean government-backed hackers had either extorted from US health care organizations or used Read More
A Windows 11 vulnerability, part of Microsoft’s Patch Tuesday roundup of fixes, is being exploited in the wild, prompting the U.S. Cybersecurity and Infrastructure Security Read More
North Korean government-backed hackers have in the last year targeted multiple health organizations with ransomware, in some cases disrupting health services for “prolonged periods,” the Read More