We’ve aggregated some of the best cybersecurity threat news from around the web to help keep you up-to-date.
- Flash loan attack on Jimbos Protocol steals over $7.5 million
- New BrutePrint Attack Lets Attackers Unlock Smartphones with Fingerprint Brute-Force
- MCNA Dental data breach impacts 8.9 million people after ransomware attack
- Lazarus hackers target Windows IIS web servers for initial access
- AceCryptor: Cybercriminals' Powerful Weapon, Detected in 240K+ Attacks
- 3 Challenges in Building a Continuous Threat Exposure Management (CTEM) Program and How to Beat Them
- Protect your business network with PureDome
- New GobRAT Remote Access Trojan Targeting Linux Routers in Japan
- Don't Click That ZIP File! Phishers Weaponizing .ZIP Domains to Trick Victims
- PyPI Implements Mandatory Two-Factor Authentication for Project Owners
- Clever ‘File Archiver In The Browser’ phishing trick uses ZIP domains
- PyPI announces mandatory use of 2FA for all software publishers
- CISA warns govt agencies of recently patched Barracuda zero-day
- QBot malware abuses Windows WordPad EXE to infect devices
- Hot Pixels attack checks CPU temp, power changes to steal data
Subscribe to this threat feed with your RSS reader: https://zjak.net/cyberthreats
Need help protecting your business? Call us today at 502-200-1169 or use the contact us form to let us know how we can help.
Free
Cybersecurity
Tips
We have the perfect way to help reduce your risk and keep you safe! Simply sign up to receive our FREE “Cyber Security Tip of the Week.” We’ll send byte-sized quick-read tips to your e-mail inbox each week. Every tip is packed with a unique and up-to-date real-world solution that keeps you one step ahead of the bad guys.
Latest Blog Posts
- No More Feature Updates for Windows 10. What You Need to KnowMicrosoft has announced that the current version of Windows 10, released in 2022, will be its final release. If you’re currently using Windows 10, you …
No More Feature Updates for Windows 10. What You Need to Know Read More »
- These Everyday Objects Can Lead to Identity TheftYou wouldn’t think a child’s toy could lead to a breach of your personal data. But this happens all the time. What about your trash …
These Everyday Objects Can Lead to Identity Theft Read More »
- How to Use the New Virtual Appointments in Microsoft TeamsScheduling appointments is a common activity. Salespeople often set up virtual appointments to answer questions about a product. Software companies allow people to schedule live …
How to Use the New Virtual Appointments in Microsoft Teams Read More »