Enterprise, Workstation, Data Center, Cloud, Networking, Software News And Reviews

In-depth product reviews and news of enterprise, workstation, networking, cloud, SMB, data center and software products and services.

Cloudflare says that it was hit by the same smishing (sms phishing) attack that recently resulted in a user data breach at Twilio. However, unlike Twilio, Cloudflare managed to prevent the attack from escalating to a data breach thanks to its strong security measures. While the attackers managed to steal login... Read more...
Last year, a hacker who goes by the name “pompompurin” managed to breach a Federal Bureau of Investigation (FBI) web portal and send out thousands of hoax emails from an official FBI email address. Just a couple weeks prior, pompompurin gained unauthorized access to the internal network of the stock trading app... Read more...
Shortly after hitting Parker Hannifin Corporation, a major component supplier for Boeing and Lockheed Martin, the Conti ransomware group abandoned the Conti name and split off into smaller groups that coordinate with the larger group’s leadership. This move came after Conti targeted the government of Costa Rica with... Read more...
Google has begun rolling out another update to its Chrome browser on all the major desktop platforms (Windows, Linux, and Mac) and there are at least 32 reasons why you should apply it sooner rather than later. That's the number of security fixes the latest update includes. If you're looking for just one very good... Read more...
Earlier this month, Clearview AI reached a settlement agreement with the American Civil Liberties Union (ACLU) over the company’s usage of Illinois citizens' biometric data without their consent. Clearview AI sells its recently patented facial recognition technology to both private companies and government agencies... Read more...
In what seems to be the year of security breaches and threat actors thieving or or holding data for ransom, defenders, or blue teamers, cannot seem to catch a break. However, just after announcing that it had hit a major component supplier for Boeing and Lockheed Martin, it appears that the Conti ransomware gang as we... Read more...
The beginning of the year saw a flurry of stories about security breaches as the cybercriminal gang known as LAPSUS$ stole data from an alarming number of big name companies in a short period of time. However, while LAPSUS$ is no longer in operation, after the London police arrested all seven members of the group... Read more...
When Coca-Cola started its “Share A Coke” campaign in the early 2010s, it was certainly not thinking of this. A ransomware group dubbed “Stormous” has reportedly stolen 161GB of data from Coca-Cola. The data is currently for sale on the dark web, although Coca-Cola has not confirmed the breach. The data includes... Read more...
If you use Cash App, some of your personal details may have been exposed. In a filing with the US Securities and Exchange Commission (SEC), Cash App developer Block (formerly Square) revealed it suffered a data breach last December in which a former employee downloaded financial reports for millions of US... Read more...
If you wait long enough, your software programs, utilities, and operating system will all take the initiative to apply any applicable updates, depending on how you have things configured. Even if you rely on automatic updates, though, sometimes you should still take matters into your own hands. Such is the case now if... Read more...
We reported a week ago on a security vulnerability in Windows that multiple publicly available exploits can leverage to gain elevated privileges. We advised readers to apply the patch for this vulnerability as soon as possible, and now the Cybersecurity and Infrastructure Security Agency (CISA) is ordering federal... Read more...
A new Security Advisory from Cisco has outlined a huge number of security-related vulnerabilities and issues that have been patched in their latest firmware update. The security advisory says to run updates on the devices affected immediately. The advisory, which was first published on February 2 and updated again... Read more...
If you're not a Linux sysadmin, you might not be familiar with Control Web Panel, but if you are a Linux sysadmin, you almost certainly are at least aware of the app. Control Web Panel, or CWP, is a free Linux control panel for various web services. It used to be called CentOS Web Panel, but these days it's supported... Read more...
To the casual observer, the world of cryptocurrency may seem like the modern version of the Wild West. It definitely doesn't help the optics when hackers infiltrate one of the leading cryptocurrency exchanges, Crypto.com, and swipe $15 million worth of Ethereum, as a blockchain security and data analytics company... Read more...
Russian hackers are reaching out to Chinese threat actors in an attempt to share tips and collaborate on cyber attacks. This comes at a time where there has been an increase in activity of Mandarin and Chinese-speaking players on RAMP and other communities across the dark web. RAMP was created last summer by a... Read more...
Hey, guess what? Apple has finally decided to allow sideloading on iOS devices! Just kidding—anyone fooled has not been paying attention to the almighty institution that is Apple, the guardian of consumers and overseer of mobile security. Or something like that. It is, however, being pressured to follow in Google's... Read more...
As it goes, crime never pays, and neither does pirating software, as some people on the internet have come to find out. In the last year, there have been reports that popular antivirus programs, like Avast, disappeared from users’ computers. Researchers at the Czech company found that this activity was tied to a new... Read more...
Back in February, developer CD Projekt Red confirmed it fell prey to a "targeted cyber attack" and went about contacting former employs and contractors, saying at the time that it did not know if any personal data was compromised, but that the "probability of such a leak is low." Now four months later, the Cyberpunk... Read more...
Though industrial cyberattacks, such as those on JBS Global or Colonial Pipeline, are on the rise, the problem is not exclusive to businesses. According to new research, consumer cyber threats jumped nearly 83% in 2020. With new types of malware skyrocketing, users now need to be more careful than ever. Today, Atlas... Read more...
After a cybercriminal manages to breach a network, it is not all about immediately attacking the target. New research shows that these black hat hackers may lie dormant or lurk on a network for around 250 hours on average before an attack kicks off or they are detected. This means that organizations should know that... Read more...
When you log onto a service, make a purchase, or do something else on the web, you have a decent chance of running into a CAPTCHA. Everyone knows what they look like, and it can be incredibly obnoxious: “Select all the buses. Click on bikes. Does this photo have traffic lights?” CAPTCHAs do not even work all the time... Read more...
We first learned of the cyberattack on Colonial Pipeline's computer systems last week. The company's extensive pipeline network is responsible for supplying the bulk of the United States East Coast with gasoline, diesel, and jet fuel. The company announced that it was a victim of a ransomware attack and had to shut... Read more...
1 2 3 4 5 Next