KEEP IN TOUCH
Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!
Microsoft’s Halo Dev Site Breached Using Dependency Hijacking Microsoft has once again been successfully hit by a dependency hijacking attack. Previously, as first reported by BleepingComputer, a researcher had ethically hacked over 35 major tech firms, including Microsoft, by exploiting a weakness called “dependency confusion.” This month, another researcher found an npm internal dependency being used
Windows 11 May Support Intel 7th Gen, AMD Zen 1 CPUs in the Future Microsoft announced today that they might lower the Windows 11 system requirements to allow Intel 7th generation and AMD Zen 1 CPUs to use the new operating system. When Microsoft announced Windows 11, they also released new system requirements that significantly reduced the variety
REvil Ransomware’s New Linux Encryptor Targets ESXi Virtual Machines The REvil ransomware operation is now using a Linux encryptor that targets and encrypts Vmware ESXi virtual machines. With the enterprise moving to virtual machines for easier backups, device management, and efficient use of resources, ransomware gangs increasingly create their own tools to mass encrypt storage
Ransomware Gangs Now Creating Websites to Recruit Affiliates Ever since two prominent Russian-speaking cybercrime forums banned ransomware-related topics [1, 2], criminal operations have been forced to promote their service through alternative methods. At least two ransomware gangs in need of hackers to run the attacks have been using their sites to advertise features of their encryption