An unnamed high-profile government organization in Southeast Asia emerged as the target of a “complex, long-running” Chinese state-sponsored cyber espionage operation codenamed Crimson Palace. “The overall goal behind the campaign was to maintain access to the target network for cyberespionage in support of Chinese state interests,” Sophos researchers Paul Jaramillo, Morgan Demboski, Sean
Monthly Archives: June 2024
Early in 2024, Wing Security released its State of SaaS Security report, offering surprising insights into emerging threats and best practices in the SaaS domain. Now, halfway through the year, several SaaS threat predictions from the report have already proven accurate. Fortunately, SaaS Security Posture Management (SSPM) solutions have prioritized mitigation capabilities to address many […]
In this Paessler PRTG review, I test each of its features first-hand to show you how well they perform. Paessler PRTG is a powerful network monitoring tool that enables IT professionals to overview the entire IT infrastructure, including networks, systems, hardware, applications, and devices. The real-time performance and health overview keeps you informed and in […]
An analysis of a nascent ransomware strain called RansomHub has revealed it to be an updated and rebranded version of Knight ransomware, itself an evolution of another ransomware known as Cyclops. Knight (aka Cyclops 2.0) ransomware first arrived in May 2023, employing double extortion tactics to steal and encrypt victims’ data for financial gain. It’s […]
In this comprehensive R-Studio Data Recovery review, I’ll help you decide if that’s the right software for you. R-Studio Data Recovery is a suite of powerful disk recovery tools, designed for professionals. The company has combined its most advanced file recovery and disk repair technologies to create this useful conglomerate. But does the app deliver? […]
Zyxel has released security updates to address critical flaws impacting two of its network-attached storage (NAS) devices that have currently reached end-of-life (EoL) status. Successful exploitation of three of the five vulnerabilities could permit an unauthenticated attacker to execute operating system (OS) commands and arbitrary code on affected installations. Impacted models include NAS326
Popular video-sharing platform TikTok has acknowledged a security issue that has been exploited by threat actors to take control of high-profile accounts on the platform. The development was first reported by Semafor and Forbes, which detailed a zero-click account takeover campaign that allows malware propagated via direct messages to compromise brand and celebrity accounts without […]
Microsoft is facing potential antitrust charges from the European Union over its practice of bundling its Teams app with the Office suite. The EU Commission launched an investigation in 2023 following a complaint from Slack, a competitor owned by Salesforce. The concern is that bundling Teams with Office gives Microsoft an unfair advantage in the […]
Microsoft Designer just unveiled a brand new feature – Sticker Creator – powered by DALL-E. This addition lets you design personalized stickers to add a unique touch to your digital projects, from documents and invitations to presentations and social media posts. Sticker Creator eliminates the barrier to entry for anyone who’s ever wanted to create […]
Our bulletin covering coordinated influence operation campaigns terminated on our platforms in Q2 2024.