Microsoft issues patch to fix PrintNightmare zero‑day bug

Microsoft issues patch to fix PrintNightmare zero‑day bug

The out-of-band update fixes a remote code execution flaw affecting the Windows Print Spooler service Microsoft on Wednesday released an emergency update to plug a vulnerability in  the Windows Print Spooler service that is being actively exploited in the wild. Dubbed PrintNightmare, the zero-day security flaw affects all versions of the Microsoft Windows operating system…
The hybrid workplace: What does it mean for cybersecurity?

The hybrid workplace: What does it mean for cybersecurity?

How can organizations mitigate the risk of damaging cyberattacks while juggling the constantly changing mix of office and off-site workers? The pandemic may finally be receding, but remote working is very much here to stay. The model that appears to be gaining most traction is a hybrid one, where most staff are allowed to spend…
Choosing your MSP: What the Kaseya incident tells us about third‑party cyber‑risk

Choosing your MSP: What the Kaseya incident tells us about third‑party cyber‑risk

Lessons to learn from the Kaseya cyberincident to protect your business’ data when doing business with a MSP. Managed service providers (MSPs) play a critical role in the IT ecosystem. By outsourcing many of their day-to-day IT requirements to these companies, smaller organizations in particular can save costs, improve service levels and focus more resources…
Microsoft Patch Tuesday fixes 13 critical flaws, including 4 under active attack

Microsoft Patch Tuesday fixes 13 critical flaws, including 4 under active attack

The latest Patch Tuesday brings a new batch of security updates addressing a total of 117 vulnerabilities The second Tuesday of the month is here, which means that Microsoft has rolled out patches for security vulnerabilities in Windows and its other products as part of its monthly Patch Tuesday bundle. This month’s batch of security updates brings…
Sports events and online streaming: prepare your cybersecurity

Sports events and online streaming: prepare your cybersecurity

If you’ll be watching Sports Streaming events on your SmartTV, laptop, tablet or cell phone, learn the tips to keep you and your personal data safe. After a year and a half of cancelled global events, the 2021 summer season is proving to be full of major sporting events across the globe, and all sports…
Ransomware: To pay or not to pay? Legal or illegal? These are the questions …

Ransomware: To pay or not to pay? Legal or illegal? These are the questions …

Caught between a rock and a hard place, many ransomware victims cave in to extortion demands. Here’s what might change the calculus. The recent spate of ransomware payments cannot be the best use of cybersecurity budgets or shareholder capital, nor is it the best use of insurance industry funds. So, why are companies paying and…
Bandidos at large: A spying campaign in Latin America

Bandidos at large: A spying campaign in Latin America

ESET Research uncovers an active malicious campaign that uses new versions of old malware, Bandook, to spy on its victims In 2021 we detected an ongoing campaign targeting corporate networks in Spanish-speaking countries, with 90% of the detections in Venezuela. When comparing the malware used in this campaign with what was previously documented, we found…
Global police shut down VPN service favored by cybercriminals

Global police shut down VPN service favored by cybercriminals

A global operation takes down the infrastructure of DoubleVPN and seizes data about its customers Law enforcement agencies from Europe, the United States and Canada have teamed up to take down the web domains and seized the infrastructure of DoubleVPN, a virtual private network (VPN) service that was used by cybercriminals to conduct their activities…
Twitter now lets users set security keys as the only 2FA method

Twitter now lets users set security keys as the only 2FA method

You can now secure your account with a physical security key as your sole 2FA method, without any additional 2FA option If you’re on Twitter, you can now use a hardware security key as your sole two-factor authentication (2FA) method. While previously the microblogging service allowed users to use a security key as one of…