Server security and platform Integrity are critical requirements in today’s datacenter, edge, and cloud environments. Many Windows Server customers have relied on built-in security capabilities such as Secure boot and BitLocker to protect their infrastructure. These capabilities are enhanced when combined with proper underlying server hardware such as Trusted Platform Module (TPM) or adequate Unified…
Malspam emails are claiming to deliver a survey on BLM — but in reality they deliver the infamous banking trojan.
The Gamaredon APT has started using a new VBA macro to target Microsoft Outlook victims’ contact lists.
Misconfigured dashboards are at the heart of a widespread XMRIG Monero-mining campaign.
Contact tracing apps for the coronavirus are being developed and tested globally as the world starts to re-open. Are the apps worth using to flatten the curve? Or do data privacy worries trump public health?
The ICS/SCADA-focused malware is likely behind a duo of attacks this week, on Honda and a South American energy company, researchers said.
Because remote workers’ devices are all connected to a home network, they don’t even need to be attacked directly. Instead, attackers have multiple avenues of attack that can be exploited.
Two critical flaws in Intel AMT, which could enable privilege escalation, were patched along with 20 other bugs in its June security update.
The increasingly prevalent GuLoader malware has been traced back to a far-reaching encryption service that attempts to pass as above-board.
Thanos is the first ransomware family to feature the weaponized RIPlace tactic, enabling it to bypass ransomware protections.