You might be interested in …

[ThreatPost] Cybercriminals Love Supply-Chain Chaos: Here’s How to Protect Your Inbox

All posts, ThreatPost

Threat actors use bogus ‘shipping delays’ to deceive customers and businesses. Troy Gill, senior manager of threat intelligence at Zix, discusses how spoofing is evolving and what to do. Source: Read More (Threatpost)

Read More

[TheRecord] HPE, Extreme Networks working to address five vulnerabilities in widely used network switches

Hewlett Packard Enterprise (HPE) and Extreme Networks are in the process of fixing five vulnerabilities affecting multiple models of Aruba and Avaya network switches used by businesses, schools, hospitals, government agencies and other organizations around the world. The devices are pivotal pieces of infrastructure that connect individual computers, servers, printers, cameras and other devices across […]

Read More

[BleepingComputer] Linux version of HelloKitty ransomware targets VMware ESXi servers

​The ransomware gang behind the highly publicized attack on CD Projekt Red uses a Linux variant that targets VMware’s ESXi virtual machine platform for maximum damage. […] Source: Read More (BleepingComputer)

Read More

Leave a Reply

Your email address will not be published.

This site uses Akismet to reduce spam. Learn how your comment data is processed.