Exchange Servers

Fix Your On-Premises Exchange Servers Urgently - Microsoft Recommends

Microsoft “strongly” advises users to maintain their Exchange…


Hive Ransomware

Hive Ransomware Taken Down in FBI's Hacking Operative

In July, the FBI confiscated the group’s infrastructure as part of an…


Email dangers

Why is Email Such a Hot Commodity for Hackers?

Email is our most effective productivity tool. That is why phishing poses such…


Malware using Microsoft OneNote

Hackers Spreading Malware using Microsoft OneNote Attachments

Threat actors are increasingly using OneNote attachments in phishing emails to…


WhatsApp Violating Data Protection Laws

WhatsApp Fined €5.5 Million for Violating Data Protection Laws

On Thursday, the Irish Data Protection Commission (DPC) fined WhatsApp, a Meta…


Norton Password Manager

Norton Password Manager Hack Affects Nearly 1 Million Users

Norton Password Manager & Norton LifeLock, a company that says it will keep…


Quantum Computing and Its Impact on Cybersecurity

The Rise of Quantum Computing and Its Impact on Cybersecurity

According to a recent Zapata Computing analysis, organizations’…


Industrial Control Systems

Industrial Control Systems from Major Manufacturers May Have Flaws, CISA Warns

Sewio, InHand Networks, Sauter Controls, and Siemens products are all affected…


LockBit ransomware

What exactly is LockBit ransomware and how does it work?

The LockBit ransomware operation has once again dominated headlines, as we…


Microsoft Macros

Microsoft Macros Explained: A Blessing and a Curse

Macros force people to choose between productivity and security. On the one…