EvilGnome Spyware Targets Linux Users

EvilGnome Spyware Targets Linux Users New research has revealed a rare piece of spyware called EvilGnome that’s designed to spy on unsuspecting Linux desktop users. Known as EvilGnome, all Linux workstation users are at risk of a new backdoor threat which implants spying software capable of recording your screen, keyboard and mouse click functions. Reports…

Bluetooth Exploit Enables Tracking on Windows PCs

Bluetooth Exploit Enables Tracking on Windows PCs Researchers have discovered a major Bluetooth bug that exposes users to third-party tracking and data access. Researchers at Boston University have discovered a vulnerability in the Bluetooth Low Energy (BLE) implementations of Microsoft and Apple devices. The vulnerability allows third-parties to determine the location and other sensitive information.…

July Third-Party Security Updates

July Third-Party Security Updates Explore the latest third-party updates as well as a controversial vulnerability with Zoom that the company has decided to eliminate. Latest Third-Party Updates This month there are several notable third-party updates that have been released. The vendors include Adobe, Foxit, GlavSoft LLC., Microsoft (Skype), and Mozilla. How are you deploying third-party…

July Patch Tuesday: Stop Zero-Day Exploits

July Patch Tuesday: Stop Zero-Day Exploits This month’s Patch Tuesday release has 77 vulnerabilities, including two zero-days—security flaws that were being actively exploited. Patch Tuesday Release Microsoft have released 78 patches today covering IE, Edge, ChakraCore, Windows and Office.p There are 15 rated Critical and 62 Important with only 1 rated Moderate. Urgent: Public and Exploited There are a total of 8 vulnerabilities…

Major Vulnerability Discovered in KACE

Major Vulnerability Discovered in KACE The CISA has recently published an advisory regarding an administrator interface vulnerability for the Quest KACE Systems Management Appliance. The Cybersecurity and Infrastructure Security Agency has recently published an advisory regarding an administrator interface vulnerability for the Quest KACE Systems Management Appliance (ICS Advisory 19-183-02) Affecting the KACE SMA (Systems…

Homeland Security Issues Critical BlueKeep Warning

Homeland Security Issues Critical BlueKeep Warning Homeland Security’s cyber agency says it has tested a working exploit for the BlueKeep vulnerability, capable of achieving remote code execution on a vulnerable device. The United States Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) has declared an official warning to patch the wormable BlueKeep flaw.…

Blue Screen of Death Occurring with Feature Updates

Blue Screen of Death Occurring with Feature Updates With the introduction of the newest Windows 10 Feature Version 1903, some security application vendors have published known issues when upgrading. This isn’t the first we’ve heard of Windows 10 upgrades being affected by antivirus or encryption software. But, in fact, Microsoft has always recommended to disable…

NSA Urging Users to Patch BlueKeep Vulnerability

NSA Urging Users to Patch BlueKeep Vulnerability The National Security Agency (NSA) is warning users that a new RDP vulnerability affecting Windows 7 and Windows XP systems is potentially “wormable.” The National Security Agency has recently issued an urgent advisory to all Windows-based administrators and users to ensure they are using a fully-patched and updated…

How Executives Can Prevent Data Breaches

How Executives Can Prevent Data Breaches When the total average cost of a data breach is $3.86 million, preventable problems are not acceptable. Here’s how to mitigate the risk. This article was originally featued in Hackernoon Data breaches are so much a part of our way of life that we barely bat an eye any…