Month: November 2024
Bitdefender has released a decryptor for the ‘ShrinkLocker’ ransomware strain, which uses Windows’ built-in BitLocker drive encryption tool to lock victim’s files. Discovered in May 2024 by researchers at cybersecurity company Kaspersky, ShrinkLocker lacks the sophistication of other ransomware families but integrates features that can maximize the damage of an attack. According to Bitdefender’s analysis, the malware appears…
Read MoreAs artificial intelligence (AI) continues to transform business operations, it’s also changing the face of cybercrime. One area particularly vulnerable to AI-powered attacks is Business Email Compromise (BEC), a form of fraud that targets companies by manipulating employees into transferring money or sensitive information. With AI in the mix, BEC has become more sophisticated, presenting…
Read MoreData theft has become an undeniable geopolitical weapon, and no player has mastered this art quite like North Korea. Rather than relying solely on traditional hacking methods, the regime has adopted a far more insidious approach — exploiting the vulnerabilities of the job market. This might be why fake job ad scams saw a 28%…
Read MoreMS-ISAC ADVISORY NUMBER: 2024-125 DATE(S) ISSUED: 11/12/2024 OVERVIEW: Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or…
Read MoreMultiple vulnerabilities have been discovered in Adobe products, the most severe of which could allow for arbitrary code execution. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install…
Read MoreMS-ISAC ADVISORY NUMBER: 2024-127 DATE(S) ISSUED: 11/12/2024 OVERVIEW: Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated…
Read MoreMS-ISAC ADVISORY NUMBER: 2024-128 DATE(S) ISSUED: 11/12/2024 OVERVIEW: Multiple vulnerabilities have been discovered in Citrix products, the most severe of which could allow for remote code execution. Citrix ADC performs application-specific traffic analysis to intelligently distribute, optimize, and secure Layer 4 – Layer 7 network traffic for web applications. Successful exploitation of the most severe…
Read MoreMS-ISAC ADVISORY NUMBER: 2024-129 DATE(S) ISSUED: 11/12/2024 OVERVIEW: Multiple vulnerabilities have been discovered in Ivanti Endpoint Manager, the most severe of which could allow for remote code execution. Ivanti Endpoint Manager is a client-based unified endpoint management software. Successful exploitation could allow for remote code execution in the context of the system. Depending on the…
Read MoreMicrosoft has fixed several bugs that cause install, upgrade, and Blue Screen of Death (BSOD) issues on Windows Server 2025 devices with a high core count. The symptoms include Windows Server 2025 installation or upgrading processes failing or hanging, as well as server boot and restarts taking as much as three hours (or even more…
Read MoreRecent Posts
- Hackers abuse Avast anti-rootkit driver to disable defenses
- Microsoft testing Windows 11 support for third-party passkeys
- Windows 11 24H2 update blocked on PCs with Assassin’s Creed, Star Wars Outlaws
- Windows 10 KB5046714 update fixes bug preventing app uninstalls
- Eight Key Takeaways From Kyndryl’s First Investor Day