The U.S. Securities and Exchange Commission has adopted new rules requiring publicly traded companies to disclose cyberattacks within four business days after determining they’re material incidents. […] Source: BleepingComputer | Read More
Category Archives: News
Microsoft has released the July 2023 optional cumulative update for Windows 11, version 22H2, with fixes for 27 issues, including ones affecting VPN performance and display or audio devices. […] Source: BleepingComputer | Read More
Microsoft has released the optional KB5028244 Preview cumulative update for Windows 10 22H2 with 19 fixes or changes, including an update to the Vulnerable Driver Blocklist to block BYOVD attacks. […] Source: BleepingComputer | Read More
A new ‘Nitrogen’ initial access malware campaign uses Google and Bing search ads to promote fake software sites that infect unsuspecting users with Cobalt Strike and ransomware payloads. […] Source: BleepingComputer | Read More
Microsoft has fixed a known issue causing video recording and playing failures in some apps on Windows 10 and Windows 11 systems. […] Source: BleepingComputer | Read More
A critical severity ‘Super Admin’ privilege elevation flaw puts over 900,000 MikroTik RouterOS routers at risk, potentially enabling attackers to take full control over a device and remain undetected. […] Source: BleepingComputer | Read More
Google is set to improve Chrome by introducing a new “Link Preview” feature. This feature, currently in development for desktop use, could significantly change how users interact with web content. […] Source: BleepingComputer | Read More
A new Mac malware named “Realst” is being used in a massive campaign targeting Apple computers, with some of its latest variants including support for macOS 14 Sonoma, which is still in development. […] Source: BleepingComputer | Read More
Microsoft is investigating a known issue causing Microsoft 365 customers to experience significant delays when saving attachments in Outlook Desktop to a network share. […] Source: BleepingComputer | Read More
New details have emerged about Decoy Dog, a largely undetected sophisticated toolkit likely used for at least a year in cyber intelligence operations, relying on the domain name system (DNS) for command and control activity. […] Source: BleepingComputer | Read More