Live Webinar | Data Classification: The Foundation of Cybersecurity ComplianceWebinar.
Thank you for registering with ISMG
Complete your profile and stay up to date
Last week a vulnerability made its way to the internet after researchers accidentally published a proof of concept. That proof of concept exploited a series of vulnerabilities in the Windows Print Spooler service. The vulnerability was dubbed PrintNightmare and until now the best way to avoid it was to disable the Print Spooler service which…
Microsoft warns of an ongoing spear-phishing campaign targeting aerospace and travel organizations with multiple remote access trojans (RATs) deployed using a new and stealthy malware loader. “In the past few months, Microsoft has been tracking a dynamic campaign targeting the aerospace and travel sectors with spear-phishing emails that distribute an actively developed loader, which then…
Fraud Management & Cybercrime , Fraud Risk Management , Governance & Risk Management Move Away From Perimeter Designed to Help Agencies Battle Supply Chain Attacks Scott Ferguson (Ferguson_Writes) • June 22, 2021 Acting CISA Director Brandon Wales The U.S. Cybersecurity and Infrastructure Agency is moving its Einstein intrusion detection system deeper into federal…
The attack overwhelmed the systems of a Belgian ISP, leading to widespread service outages and disruptions Many government websites and services in Belgium were knocked offline on Tuesday after Belnet, the internet service provider (ISP) for the country’s public sector, was hit by a massive distributed denial-of-service (DDoS) attack. According to Belnet, the attack started…
Last week iOS 14.7 appeared, adding features including support for Apple’s magnetic battery pack. Unfortunately, the update also interrupted the “Unlock with iPhone” feature that Apple Watch wearers used for easy access to their wristwear. Now, another update is going out to fix that. However, even if you don’t have an Apple Watch, you should…
CISA, the US Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency, has told federal agencies that they have until 12:00pm EDT on Monday April 5 to scan their networks for evidence of intrusion by malicious actors, and report back the results. CISA is ordering agencies with on-premises Microsoft Exchange servers to urgently conduct the…