Stealth Soldier: A New Custom Backdoor Targets North Africa with Espionage Attacks

A new custom backdoor dubbed Stealth Soldier has been deployed as part of a set of highly-targeted espionage attacks in North Africa.
“Stealth Soldier malware is an undocumented backdoor that primarily operates surveillance functions such as file exfil… Continue reading Stealth Soldier: A New Custom Backdoor Targets North Africa with Espionage Attacks

Posted in Uncategorized

June 2023 Patch Tuesday forecast: Don’t forget about Apple

The odd month-to-month pattern of CVEs addressed by Microsoft continued with the May Patch Tuesday. After seeing high numbers for April, we saw 20 and 23 CVEs fixed for Windows 11 and 10, respectively, in May. And after 62 CVEs were fixed for Server 20… Continue reading June 2023 Patch Tuesday forecast: Don’t forget about Apple

Session Cloud Files Diagnostic Event Listener failed to start with error 0xc0000022

In this article, we cover ways to resolve Session Cloud Files Diagnostic Event Listener failed to start with error 0xc0000022. This is a Kernel-EventTracing error, which is a tool that Windows users can use to view any errors that might have happened. … Continue reading Session Cloud Files Diagnostic Event Listener failed to start with error 0xc0000022

Weekly Update 351

Presently sponsored by: Kolide can get your cross-platform fleet to 100% compliance. It’s Zero Trust for Okta. Want to see for yourself? Book a demo.

I spent most of this week’s update on the tweaking I went through with Azure’s API Management service and then using Cloudflare to stop a whole bunch of requests that really didn’t need to go all the way to the origin (or at least

Continue reading Weekly Update 351

Introducing the book: Creating a Small Business Cybersecurity Program, Second Edition

In this Help Net Security video interview, Alan Watkins, CIS Controls Ambassador, CIS, talks about his new book – Creating a Small Business Cybersecurity Program, Second Edition. This book provides guidance and essential steps small businesses wi… Continue reading Introducing the book: Creating a Small Business Cybersecurity Program, Second Edition