Enterprise, Workstation, Data Center, Cloud, Networking, Software News And Reviews

In-depth product reviews and news of enterprise, workstation, networking, cloud, SMB, data center and software products and services.

HP, which maintains a threat analyst team, has released a post on its threat research blog detailing a tricky new malware campaign. Only a day after Microsoft announced that Windows 11 was entering its final phase of availability, becoming available for broad deployment on eligible devices, HP discovered that someone... Read more...
A few days after the last security update for the Google Pixel 3 ever, Samsung has announced that select Galaxy devices get four generations of updates. With pre-orders now available for the Galaxy S22 series in full swing, this announcement steps all over Google's policy of up to three years of OS updates for its... Read more...
ExpressVPN runs a bug bounty program through Bugcrowd for the purpose of improving security across the VPN company’s services and websites. The program has already had 22 successful bounty claimants, but ExpressVPN is now sweetening the pot in order to attract more white hat hackers. ExpressVPN’s bounty program has... Read more...
Google's flagship phone family sure has had its fair share of ups and downs. The Pixel 3 is no different. Today the down is that the device will receive its final security update. While having one of the best phone cameras at the time of release, it did not exactly sell like hotcakes, at least not right away. After... Read more...
When folks talk about major security flaws like the Log4shell exploit in Log4j, or the Eternal Silence UPnP exploit, everyone tends to panic until they're resolved. That's because those bugs are remotely exploitable, meaning that they can be used to attack a system over the internet without placing the attacker in... Read more...
The US Department of Justice (DOJ) announced it has seized an estimated $3.6 billion in stolen cryptocurrency. The seizure came along with the arrest of a married couple accused of laundering 119,754 bit coin in an elaborate scheme. Headlines denoting hackers stealing cryptocurrency is not an uncommon occurrence... Read more...
Back in May of last year, we reported on a new campaign by Google to increase user account security through a number of methods. As part of this campaign, Google announced its plans to drive people to use two-factor authentication (2FA), saying that users whose accounts are appropriately configured would begin to be... Read more...
Since their beginning, macros in Office applications have been both a blessing and a curse for users and system administrators alike. The feature causes significant security woes due to many methods of exploitation in the macro system. Now Microsoft has stated that its popular productivity suite is getting extra... Read more...
We reported a week ago on a security vulnerability in Windows that multiple publicly available exploits can leverage to gain elevated privileges. We advised readers to apply the patch for this vulnerability as soon as possible, and now the Cybersecurity and Infrastructure Security Agency (CISA) is ordering federal... Read more...
A new Security Advisory from Cisco has outlined a huge number of security-related vulnerabilities and issues that have been patched in their latest firmware update. The security advisory says to run updates on the devices affected immediately. The advisory, which was first published on February 2 and updated again... Read more...
A cybersecurity firm just recently discovered a search engine optimization (SEO) poisoning campaign intended to dupe users into installing malware on their computers. The campaign works by leveraging various SEO techniques, such as cramming tons of keywords into the source code of various malicious webpages, in order... Read more...
Intel has published its 2021 Product Security Report and in it the company suggests its processors are far less buggy than AMD's chips. The key section is on page 28 where Intel highlights having reported 16 CPU vulnerabilities last year, whereas AMD reported 31 CPU vulnerabilities in the same time period. What can we... Read more...
A trojan known as UpdateAgent began infecting Mac computers back in September 2020, but this infection was relatively innocuous at the time, doing nothing other than collecting some basic system and device information and broadcasting its presence to the command-and-control (C2) server. However, Microsoft has been... Read more...
In one of the largest DeFi hacks ever, a hacker is being offered a $10 million bug bounty for the return of stolen money. Wormhole, one of the biggest bridges between Solana and other blockchains, was hacked for approximately $324 million. Cryptocurrency is one of the hottest assets going right now. So hot that... Read more...
A team from Binarly, a firmware protection company, recently discovered several repeatable anomalies on twenty different enterprise machines in the course of a job for a midsize enterprise company. After looking further into these anomalies and digging all the way down into the disassembly code, the team found 23... Read more...
If you fancy yourself an elite hacker, there could be an Intel event in your future. The chip maker announced it is expanding its bug bounty program with Project Circuit Breaker, which will provide capable hackers with opportunities to win prizes and swag by hunting for bugs in firmware, hypervisors, GPUs, chipsets... Read more...
Having entered a new year, cybersecurity experts, researchers, and companies are reflecting on 2021 and assessing the state of cybersecurity so that we can better understand and prepare for threats going forward. Unfortunately, the outlook going forward into 2022 seems pretty disheartening as far as ransomware is... Read more...
Practically anything and everything can be accomplished online these days, and that obviously includes applying for a job. As it relates to that, the Federal Bureau of Investigation (FBI) posted a notice warning that scammers are preying on job applicants resulting in an average loss of $3,000 per victim, as well as... Read more...
Researchers say you should upgrade a popular WordPress plugin sooner than later, or else you could end up losing access to your website, and potentially your web server! If you exist on the internet, you likely know of or have seen at least one WordPress site. The content-management software is likely the most... Read more...
A couple of weeks back, AMD launched the Radeon RX 6500 XT, an entry-level GPU targeting mainstream gamers with 1080p displays. The Radeon RX 6500 XT is built around the Navi 24 GPU, which is the smallest discrete graphics processor in AMD’s current RDNA 2 line-up. Navi 24 is manufactured on a 6nm process node... Read more...
Back in 2018, a team of security researchers from Akamai released a white paper detailing a malicious proxy system they dubbed UPnProxy that is now being leveraged in a new attack. The malicious proxy system draws its name from Universal Plug and Play (UPnP), which is a set of networking protocols that enables devices... Read more...
A security researcher who goes by the name “RyeLv” recently discovered an elevation of privilege vulnerability in Windows. Microsoft has publicly disclosed the vulnerability and registered it in the Common Vulnerabilities and Exposures (CVE) system with the name CVE-2022-21882. The National Institute of Standards and... Read more...
First ... Prev 18 19 20 21 22 Next