Windows ‘Downdate’ Attack Reverts Patched PCs to a Vulnerable State
Windows 11 machines remain open to downgrade attacks, where attackers can abuse the Windows Update process to revive a patched…
Cybercriminals Use Webflow to Deceive Users into Sharing Sensitive Login Credentials
Cybersecurity researchers have warned of a spike in phishing pages created using a website builder tool called Webflow, as threat…
Microsoft: Healthcare Sees 300% Surge in Ransomware Attacks
Even after the ransom is paid, such attacks lead to spikes in strokes and heart attacks and increased wait times…
UnitedHealth Reveals 100M Compromised in Change Healthcare Breach
Eight months after the breach occurred, Change Healthcare has finally sent out millions of notices of compromised data to affected…
Lazarus Group Exploits Google Chrome Vulnerability to Control Infected Devices
The North Korean threat actor known as Lazarus Group has been attributed to the zero-day exploitation of a now-patched security…
Internet Archive Gets Pummeled in Round 2 Breach
This latest breach was through Zendesk, a customer service platform that the organization uses. This latest breach was through Zendesk,…
Anti-Bot Services Help Cybercrooks Bypass Google ‘Red Page’
The emergence of novel anti-detection kits for sale on the Dark Web limit the effectiveness of a Chrome browser feature…
TrickMo Banking Trojan Can Now Capture Android PINs and Unlock Patterns
New variants of an Android banking trojan called TrickMo have been found to harbor previously undocumented features to steal a…