by

Microsoft Deprecates Dated 1024-Bit RSA Keys for Windows

Microsoft has announced that RSA encryption keys shorter than 2048 bits will soon be deprecated in Windows Transport Layer Security (TLS) to improve security...

Read More →

by

Meta Being Investigated by Federal Authorities for Drug Sales on Platforms

Prosecutors in Virginia are investigating Meta Platforms over its role in enabling the sales of illegal drugs on Facebook and Instagram. Find out more about...

Read More →

by

Windows SmartScreen Vulnerability Exploited To Spread DarkGate Malware

DarkGate malware is being distributed by exploiting a vulnerability in Windows Defender SmartScreen. Find out how the exploit works and the dangers that it...

Read More →

by

Massive Cyberattack Targets French Government Services

The French government has reported a major cyberattack on several of its services. Learn more about the threat actors, the scope of the attack, and its impact...

Read More →

by

Cisco Patches Critical VPN Hijacking Flaws in Secure Client

Cisco has fixed high-severity bugs in its Secure Client software that allowed bad actors to hijack VPN connections. Learn more about the threat and its effects...

Read More →

by

41 States Urge Meta to Combat Facebook and Instagram Account Takeovers

More than 40 U.S. states have urged Meta Platforms to take action against hackers and scammers who hijack Instagram and Facebook accounts. Learn about the...

Read More →

by

Microsoft Patches Windows Zero-Day Exploited by Hackers Since August 2023

Microsoft has fixed a high-severity vulnerability in Windows six months after being warned about the zero-day exploitation. Learn more about the critical...

Read More →

by

Vulnerability Assessment vs. Penetration Testing: 8 Differences

Understanding the difference between vulnerability assessments (VAs) and penetration testing (PT) is essential for effective cybersecurity. VAs are automated...

Read More →

by

U.S. Pharmacies Face Nationwide Cyberattack

Pharmacies across the U.S. reported problems meeting prescription requirements following a cyberattack against a major healthcare technology provider,...

Read More →

by

LockBit Ransomware Group Reemerges Following International Law Enforcement Operation

The threat actors responsible for the LockBit ransomware operation have become operational again on the dark web despite an international law enforcement...

Read More →

by

Apple Rolls Out Post-Quantum Encryption Standard for iMessage

Apple has upgraded its iMessage app with a new post-quantum cryptographic security protocol. Find out more about this innovative development that aims to...

Read More →

by

What Is a DISA Security Technical Implementation Guide (STIG)? Definition, Application, and Compliance Levels

Security Technical Implementation Guides (STIGs) are detailed, prescriptive documents outlining standardized security configurations for specific platforms,...

Read More →

Close Search Window
Close