E.U. Authorities Crack Encryption of Massive Criminal and Murder Network

Four-year investigation shuts down EncroChat and busts 746 alleged criminals for planning murders, selling drugs and laundering money. Continue reading E.U. Authorities Crack Encryption of Massive Criminal and Murder Network

Microsoft Releases Emergency Security Updates for Windows 10, Server

The patches fix two separate RCE bugs in Windows Codecs that allow hackers to exploit playback of multimedia files. Continue reading Microsoft Releases Emergency Security Updates for Windows 10, Server

CISA: Nation-State Attackers Likely to Exploit Palo Alto Networks Bug

An authentication-bypass vulnerability allows attackers to access network assets without credentials when SAML is enabled on certain firewalls and enterprise VPNs. Continue reading CISA: Nation-State Attackers Likely to Exploit Palo Alto Networks Bug

TikTok To Stop Clipboard Snooping After Apple Privacy Feature Exposes Behavior

App will stop reading users’ device cut-and-paste data after a new banner alert in an Apple update uncovered the activity. Continue reading TikTok To Stop Clipboard Snooping After Apple Privacy Feature Exposes Behavior

Office 365 Users Targeted By ‘Coronavirus Employee Training’ Phish

Threat actors shift focus from COVID-19 to employee coronavirus training and current events like Black Lives Matter as cyber-attacks continue to rise. Continue reading Office 365 Users Targeted By ‘Coronavirus Employee Training’ Phish

Experts Denounce Racial Bias of Crime-Predictive Facial-Recognition AI

An open letter signed by experts in the field from MIT, Microsoft and Google aim to stop the ‘tech to prison’ pipeline. Continue reading Experts Denounce Racial Bias of Crime-Predictive Facial-Recognition AI

Netgear Zero-Day Allows Full Takeover of Dozens of Router Models

An unpatched vulnerability in the web server of device firmware gives attackers root privileges, researchers said. Continue reading Netgear Zero-Day Allows Full Takeover of Dozens of Router Models

Phishing Campaign Targeting Office 365, Exploits Brand Names

Attackers use trusted entities to trick victims into giving up their corporate log-in details as well as to bypass security protections. Continue reading Phishing Campaign Targeting Office 365, Exploits Brand Names