Hackers are constantly on the lookout for new ways of causing mayhem and stealing data. Recently, researchers have unearthed a new technique to be on guard against. A few hackers have begun embedding credit card stealing scripts inside favicon meta […]
Does your company make use of VMware products? If so, be advised that a pair of researchers from Synacktiv recently reported a series of critical security flaws in VMware’s ESXi, Workstation and Fusion products. The recent discovery prompted the company […]
If you’re like many businesses today, there’s a good chance you’ve made this one mistake with your IT security: you don’t budget for it. Or if you do budget for it, it’s not enough to really protect your business. Time […]
If you have computers on your corporate network that rely on NVIDIA hardware and software, be advised that the company recently released security updates to address serious security vulnerabilities found in CUDA and GPU Display drivers and Virtual GPU Management […]
Researchers have discovered a devilishly clever new stain of malware currently in use by hackers around the world. The new strain is appropriately called “Lucifer,” and has been making life quite difficult for IT professionals managing Windows environments. The malware […]
Eleven years ago, Microsoft embarked on a bold experiment to emulate Apple. They opened a number of brick and mortar retail stores. Unfortunately, their stores never caught on quite the same way that the Apple Store did, and the rise […]
Big changes are in the works for Apple’s venerable MacOS, as the company prepares for a future where the desktop OS shares increasing amounts in common with both iOS and iPadOS. A recent preview of the latest desktop OS reveals […]
Recently, Microsoft’s Defender ATP Research Team issued guidance relating to defending against attacks that target Exchange servers. They are coming under increasing attack based on the latest Microsoft statistics, which show a marked increase in the use of web shells […]
Do you rely on Cisco’s Webex Meetings app for video conferencing? If so, be advised that the company found and addressed a pair of high severity security flaws that could allow hackers to remotely execute code on vulnerable machines. The […]