Email:

Phone No.

Whatsapp

Blog

Windows 10 2004 KB4571756 Breaks Windows Subsystem For Linux 2
Windows 10 2004 KB4571756 Breaks Windows Subsystem For Linux 2
Windows 10 2004 KB4571756 Breaks Windows Subsystem For Linux 2
Windows 10 2004 KB4571756 Breaks Windows Subsystem For Linux 2

Windows 10 2004 KB4571756 Breaks Windows Subsystem For Linux 2

Windows 10 2004 KB4571756 Breaks Windows Subsystem For Linux 2 The Windows 10 KB4571756 security update released yesterday is reportedly breaking Microsoft’s Windows Subsystem for Linux 2 (WSL2) compatibility layer. This issue prevents Windows 10 2004 users from launching the Windows Terminal with WSL2, with the app crashing and throwing “Element not found” and “Process exited with code 4294967295” errors.

Netwalker Ransomware Hits Pakistan’s Largest Private Power Utility

Netwalker Ransomware Hits Pakistan’s Largest Private Power Utility K-Electric, the sole electricity provider for Karachi, Pakistan, has suffered a Netwalker ransomware attack that led to the disruption of billing and online services. K-Electric is Pakistan’s largest power supplier, serving 2.5 million customers and employing over 10 thousand people. Starting yesterday, K-Electric customers have been unable

Intel Fixes Critical Flaw in Corporate Remote Management Platform

Intel Fixes Critical Flaw in Corporate Remote Management Platform Image: Intel Intel today addressed nine security vulnerabilities with the release of the September 2020 Platform Update, one of them being a critical flaw impacting the Active Management Technology (AMT) and Intel Standard Manageability (ISM) platforms. Intel ATM is part of the Intel vPro platform, which spans Intel Core vPro and Intel Xeon processors, and it is primarily used by

Hackers Use Legit Tool To Take Over Docker, Kubernetes Platforms

Hackers Use Legit Tool To Take Over Docker, Kubernetes Platforms Image: Cado Security In a recent attack, cybercrime group TeamTNT relied on a legitimate tool to avoid deploying malicious code on compromised cloud infrastructure and still have a good grip on it. They used an opensource tool specifically created to monitor and control cloud environments with

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
× Chat with us