New AMD drivers enhance Windows 10 on 5600M MacBook Pros
On June 29, AMD published new Boot Camp drivers for the MacBook Pro with Radeon 5600M. These new drivers released by AMD can be used in Boot Camp when booting into Windows 10 on the new MacBook Pro. [...]
https://www.bleepingcomputer.com/news/hardware/new-amd-drivers-enhance-windows-10-on-5600m-macbook-pros/
On June 29, AMD published new Boot Camp drivers for the MacBook Pro with Radeon 5600M. These new drivers released by AMD can be used in Boot Camp when booting into Windows 10 on the new MacBook Pro. [...]
https://www.bleepingcomputer.com/news/hardware/new-amd-drivers-enhance-windows-10-on-5600m-macbook-pros/
BleepingComputer
New AMD drivers enhance Windows 10 on 5600M MacBook Pros
On June 29, AMD published new Boot Camp drivers for the MacBook Pro with Radeon 5600M. These new drivers released by AMD can be used in Boot Camp when booting into Windows 10 on the new MacBook Pro.
Microsoft releases OOB security updates for Windows 10 RCE bugs
Microsoft has released two out-of-band security updates to address remote code execution security vulnerabilities affecting the Microsoft Windows Codecs Library on several Windows 10 and Windows Server versions. [...]
https://www.bleepingcomputer.com/news/security/microsoft-releases-oob-security-updates-for-windows-10-rce-bugs/
Microsoft has released two out-of-band security updates to address remote code execution security vulnerabilities affecting the Microsoft Windows Codecs Library on several Windows 10 and Windows Server versions. [...]
https://www.bleepingcomputer.com/news/security/microsoft-releases-oob-security-updates-for-windows-10-rce-bugs/
BleepingComputer
Microsoft releases urgent security updates for Windows 10 Codecs bugs
Microsoft has released two out-of-band security updates to address remote code execution security vulnerabilities affecting the Microsoft Windows Codecs Library on several Windows 10 and Windows Server versions.
EvilQuest wiper uses ransomware cover to steal files from Macs
A new info-stealer called EvilQuest is using ransomware as a decoy to steal files from macOS users. The victims get infected after downloading trojanized installers of popular apps from torrent trackers. [...]
https://www.bleepingcomputer.com/news/security/evilquest-wiper-uses-ransomware-cover-to-steal-files-from-macs/
A new info-stealer called EvilQuest is using ransomware as a decoy to steal files from macOS users. The victims get infected after downloading trojanized installers of popular apps from torrent trackers. [...]
https://www.bleepingcomputer.com/news/security/evilquest-wiper-uses-ransomware-cover-to-steal-files-from-macs/
BleepingComputer
ThiefQuest ransomware is a file-stealing Mac wiper in disguise
A new data wiper and info-stealer called EvilQuest is using ransomware as a decoy to steal files from macOS users. The victims get infected after downloading trojanized installers of popular apps from torrent trackers.
Microsoft lifts Windows 10 2004 update block on Surface devices
Microsoft removed a Windows 10 2004 safeguard hold applied to block customers from experiencing sporadic shutdowns and restarts on some Microsoft Surface devices after applying the Windows 10 May 2020 Update. [...]
https://www.bleepingcomputer.com/news/microsoft/microsoft-lifts-windows-10-2004-update-block-on-surface-devices/
Microsoft removed a Windows 10 2004 safeguard hold applied to block customers from experiencing sporadic shutdowns and restarts on some Microsoft Surface devices after applying the Windows 10 May 2020 Update. [...]
https://www.bleepingcomputer.com/news/microsoft/microsoft-lifts-windows-10-2004-update-block-on-surface-devices/
BleepingComputer
Microsoft lifts Windows 10 2004 update block on Surface devices
Microsoft removed a Windows 10 2004 safeguard hold applied to block customers from experiencing sporadic shutdowns and restarts on some Microsoft Surface devices after applying the Windows 10 May 2020 Update.
Mozilla rolls out emergency Firefox update to fix search issues
After releasing Firefox 78 yesterday, Mozilla quickly halted its rollout via automatic updates due to problems discovered with the built-in search functionality. Today, Mozilla has released a new version 78.0.1 to fix these issues and has resumed auto-updates. [...]
https://www.bleepingcomputer.com/news/software/mozilla-rolls-out-emergency-firefox-update-to-fix-search-issues/
After releasing Firefox 78 yesterday, Mozilla quickly halted its rollout via automatic updates due to problems discovered with the built-in search functionality. Today, Mozilla has released a new version 78.0.1 to fix these issues and has resumed auto-updates. [...]
https://www.bleepingcomputer.com/news/software/mozilla-rolls-out-emergency-firefox-update-to-fix-search-issues/
BleepingComputer
Mozilla rolls out emergency Firefox update to fix search issues
After releasing Firefox 78 yesterday, Mozilla quickly halted its rollout via automatic updates due to problems discovered with the built-in search functionality. Today, Mozilla has released a new version 78.0.1 to fix these issues and has resumed auto-updates.
Dozens of US news sites hacked in WastedLocker ransomware attacks
The Evil Corp gang hacked into dozens of US newspaper websites owned by the same company to infect the employees of over 30 major US private firms using fake software update alerts displayed by the malicious SocGholish JavaScript-based framework. [...]
https://www.bleepingcomputer.com/news/security/dozens-of-us-news-sites-hacked-in-wastedlocker-ransomware-attacks/
The Evil Corp gang hacked into dozens of US newspaper websites owned by the same company to infect the employees of over 30 major US private firms using fake software update alerts displayed by the malicious SocGholish JavaScript-based framework. [...]
https://www.bleepingcomputer.com/news/security/dozens-of-us-news-sites-hacked-in-wastedlocker-ransomware-attacks/
BleepingComputer
Dozens of US news sites hacked in WastedLocker ransomware attacks
The Evil Corp gang hacked into dozens of US newspaper websites owned by the same company to infect the employees of over 30 major US private firms using fake software update alerts displayed by the malicious SocGholish JavaScript-based framework.
Windows 10 PowerToys 0.19 released in huge stability bug fix
Microsoft has released PowerToys 0.19 in a huge bug fix that aims to increase performance and stability in the tools. [...]
https://www.bleepingcomputer.com/news/microsoft/windows-10-powertoys-019-released-in-huge-stability-bug-fix/
Microsoft has released PowerToys 0.19 in a huge bug fix that aims to increase performance and stability in the tools. [...]
https://www.bleepingcomputer.com/news/microsoft/windows-10-powertoys-019-released-in-huge-stability-bug-fix/
BleepingComputer
Windows 10 PowerToys 0.19 released in huge stability bug fix
Microsoft has released PowerToys 0.19 in a huge bug fix that aims to increase performance and stability in the tools.
US Govt shares tips on defending against cyberattacks via Tor
The Cybersecurity and Infrastructure Security Agency (CISA) today issued guidance on how to protect against cyberattacks launched from the activity originating from or routed through the Tor anonymity network. [...]
https://www.bleepingcomputer.com/news/security/us-govt-shares-tips-on-defending-against-cyberattacks-via-tor/
The Cybersecurity and Infrastructure Security Agency (CISA) today issued guidance on how to protect against cyberattacks launched from the activity originating from or routed through the Tor anonymity network. [...]
https://www.bleepingcomputer.com/news/security/us-govt-shares-tips-on-defending-against-cyberattacks-via-tor/
BleepingComputer
US Govt shares tips on defending against cyberattacks via Tor
The Cybersecurity and Infrastructure Security Agency (CISA) today issued guidance on how to protect against cyberattacks launched from the activity originating from or routed through the Tor anonymity network.
Windows POS malware uses DNS to smuggle stolen credit cards
A Windows Point-of-Sale (POS) malware has been discovered using the DNS protocol to smuggle stolen credit cards to a remote server under attacker's control. [...]
https://www.bleepingcomputer.com/news/security/windows-pos-malware-uses-dns-to-smuggle-stolen-credit-cards/
A Windows Point-of-Sale (POS) malware has been discovered using the DNS protocol to smuggle stolen credit cards to a remote server under attacker's control. [...]
https://www.bleepingcomputer.com/news/security/windows-pos-malware-uses-dns-to-smuggle-stolen-credit-cards/
BleepingComputer
Windows POS malware uses DNS to smuggle stolen credit cards
A Windows Point-of-Sale (POS) malware has been discovered using the DNS protocol to smuggle stolen credit cards to a remote server under attacker's control.
TrickBot malware now checks screen resolution to evade analysis
The infamous TrickBot trojan has started to check the screen resolutions of victims to detect whether the malware is running in a virtual machine. [...]
https://www.bleepingcomputer.com/news/security/trickbot-malware-now-checks-screen-resolution-to-evade-analysis/
The infamous TrickBot trojan has started to check the screen resolutions of victims to detect whether the malware is running in a virtual machine. [...]
https://www.bleepingcomputer.com/news/security/trickbot-malware-now-checks-screen-resolution-to-evade-analysis/
BleepingComputer
TrickBot malware now checks screen resolution to evade analysis
The infamous TrickBot trojan has started to check the screen resolutions of victims to detect whether the malware is running in a virtual machine.
Federal Reserve shares tips on mitigating synthetic identity fraud
The U.S. Federal Reserve today issued guidance on how financial organizations from the United States can mitigate payment fraud attempts scammers carry out with the help of synthetic identity accounts. [...]
https://www.bleepingcomputer.com/news/security/federal-reserve-shares-tips-on-mitigating-synthetic-identity-fraud/
The U.S. Federal Reserve today issued guidance on how financial organizations from the United States can mitigate payment fraud attempts scammers carry out with the help of synthetic identity accounts. [...]
https://www.bleepingcomputer.com/news/security/federal-reserve-shares-tips-on-mitigating-synthetic-identity-fraud/
BleepingComputer
Federal Reserve shares tips on mitigating synthetic identity fraud
The U.S. Federal Reserve today issued guidance on how financial organizations from the United States can mitigate payment fraud attempts scammers carry out with the help of synthetic identity accounts.
Microsoft unveils new Windows 10 Start Menu with theme-aware tiles
Say goodbye to the blocky Window 10 Start Menu tiles with colored backgrounds and hello to partially transparent theme-aware tiles that look so much nicer. [...]
https://www.bleepingcomputer.com/news/microsoft/microsoft-unveils-new-windows-10-start-menu-with-theme-aware-tiles/
Say goodbye to the blocky Window 10 Start Menu tiles with colored backgrounds and hello to partially transparent theme-aware tiles that look so much nicer. [...]
https://www.bleepingcomputer.com/news/microsoft/microsoft-unveils-new-windows-10-start-menu-with-theme-aware-tiles/
BleepingComputer
Microsoft unveils new Windows 10 Start Menu with theme-aware tiles
Say goodbye to the blocky Window 10 Start Menu tiles with colored backgrounds and hello to partially transparent theme-aware tiles that look so much nicer.
GoldenSpy backdoor installed by tax software gets remotely removed
As soon as security researchers uncovered the activity of GoldenSpy backdoor, the actor behind it fell back and delivered an uninstall tool to remove all traces of the malware. [...]
https://www.bleepingcomputer.com/news/security/goldenspy-backdoor-installed-by-tax-software-gets-remotely-removed/
As soon as security researchers uncovered the activity of GoldenSpy backdoor, the actor behind it fell back and delivered an uninstall tool to remove all traces of the malware. [...]
https://www.bleepingcomputer.com/news/security/goldenspy-backdoor-installed-by-tax-software-gets-remotely-removed/
BleepingComputer
GoldenSpy backdoor installed by tax software gets remotely removed
As soon as security researchers uncovered the activity of GoldenSpy backdoor, the actor behind it fell back and delivered an uninstall tool to remove all traces of the malware.
Hundreds arrested after encrypted messaging network takeover
European law enforcement agencies arrested hundreds of suspects in several countries including France, Netherlands, the UK, Norway, and Sweden after infiltrating the EncroChat encrypted mobile communication network used by organized crime groups. [...]
https://www.bleepingcomputer.com/news/security/hundreds-arrested-after-encrypted-messaging-network-takeover/
European law enforcement agencies arrested hundreds of suspects in several countries including France, Netherlands, the UK, Norway, and Sweden after infiltrating the EncroChat encrypted mobile communication network used by organized crime groups. [...]
https://www.bleepingcomputer.com/news/security/hundreds-arrested-after-encrypted-messaging-network-takeover/
BleepingComputer
Hundreds arrested after encrypted messaging network takeover
European law enforcement agencies arrested hundreds of suspects in several countries including France, Netherlands, the UK, Norway, and Sweden after infiltrating the EncroChat encrypted mobile communication network used by organized crime groups.
Researchers link APT15 hackers to Chinese military company
Researchers have linked the APT15 hacking group known for Android spyware apps to a Chinese military company, Xi'an Tian He Defense Technology Co. Ltd. [...]
https://www.bleepingcomputer.com/news/security/researchers-link-apt15-hackers-to-chinese-military-company/
Researchers have linked the APT15 hacking group known for Android spyware apps to a Chinese military company, Xi'an Tian He Defense Technology Co. Ltd. [...]
https://www.bleepingcomputer.com/news/security/researchers-link-apt15-hackers-to-chinese-military-company/
BleepingComputer
Researchers link APT15 hackers to Chinese military company
Researchers have linked the APT15 hacking group known for Android spyware apps to a Chinese military company, Xi'an Tian He Defense Technology Co. Ltd.
Microsoft shares Windows 10 2004 workaround for Storage Spaces issue
Microsoft has provided workarounds to help customers partially mitigate the impact of an issue affecting some devices with Parity Storage Spaces configurations after applying the May 2020 Update. [...]
https://www.bleepingcomputer.com/news/microsoft/microsoft-shares-windows-10-2004-workaround-for-storage-spaces-issue/
Microsoft has provided workarounds to help customers partially mitigate the impact of an issue affecting some devices with Parity Storage Spaces configurations after applying the May 2020 Update. [...]
https://www.bleepingcomputer.com/news/microsoft/microsoft-shares-windows-10-2004-workaround-for-storage-spaces-issue/
BleepingComputer
Microsoft shares Windows 10 2004 workaround for Storage Spaces issue
Microsoft has provided workarounds to help customers partially mitigate the impact of an issue affecting some devices with Parity Storage Spaces configurations after applying the May 2020 Update.
NSA releases guidance on securing IPsec Virtual Private Networks
The US National Security Agency (NSA) has published guidance on how to properly secure IP Security (IPsec) Virtual Private Networks (VPNs) against potential attacks. [...]
https://www.bleepingcomputer.com/news/security/nsa-releases-guidance-on-securing-ipsec-virtual-private-networks/
The US National Security Agency (NSA) has published guidance on how to properly secure IP Security (IPsec) Virtual Private Networks (VPNs) against potential attacks. [...]
https://www.bleepingcomputer.com/news/security/nsa-releases-guidance-on-securing-ipsec-virtual-private-networks/
BleepingComputer
NSA releases guidance on securing IPsec Virtual Private Networks
The US National Security Agency (NSA) has published guidance on how to properly secure IP Security (IPsec) Virtual Private Networks (VPNs) against potential attacks.
Windows 10 background image tool can be abused to download malware
A binary in Windows 10 responsible for setting an image for the desktop and lock screen can help attackers download malware on a compromised system without raising the alarm. [...]
https://www.bleepingcomputer.com/news/security/windows-10-background-image-tool-can-be-abused-to-download-malware/
A binary in Windows 10 responsible for setting an image for the desktop and lock screen can help attackers download malware on a compromised system without raising the alarm. [...]
https://www.bleepingcomputer.com/news/security/windows-10-background-image-tool-can-be-abused-to-download-malware/
BleepingComputer
Windows 10 background image tool can be abused to download malware
A binary in Windows 10 responsible for setting an image for the desktop and lock screen can help attackers download malware on a compromised system without raising the alarm.
Surge of MongoDB ransom attacks use GDPR as extortion leverage
A flood of attacks is targeting unsecured MongoDB servers and wiping their databases. Left behind are notes demanding a ransom payment, or the data will be leaked, and the owners reported for GDPR violations. [...]
https://www.bleepingcomputer.com/news/security/surge-of-mongodb-ransom-attacks-use-gdpr-as-extortion-leverage/
A flood of attacks is targeting unsecured MongoDB servers and wiping their databases. Left behind are notes demanding a ransom payment, or the data will be leaked, and the owners reported for GDPR violations. [...]
https://www.bleepingcomputer.com/news/security/surge-of-mongodb-ransom-attacks-use-gdpr-as-extortion-leverage/
BleepingComputer
Surge of MongoDB ransom attacks use GDPR as extortion leverage
A flood of attacks is targeting unsecured MongoDB servers and wiping their databases. Left behind are notes demanding a ransom payment, or the data will be leaked, and the owners reported for GDPR violations.
Malwarebytes AdwCleaner now removes malware from the command line
The popular AdwCleaner tool from Malwarebytes is about to get even more popular as it now can be used entirely from the command line. [...]
https://www.bleepingcomputer.com/news/security/malwarebytes-adwcleaner-now-removes-malware-from-the-command-line/
The popular AdwCleaner tool from Malwarebytes is about to get even more popular as it now can be used entirely from the command line. [...]
https://www.bleepingcomputer.com/news/security/malwarebytes-adwcleaner-now-removes-malware-from-the-command-line/
BleepingComputer
Malwarebytes AdwCleaner now removes malware from the command line
The popular AdwCleaner tool from Malwarebytes is about to get even more popular as it now can be used entirely from the command line.
Microsoft Defender ATP now helps secure network devices
Microsoft Defender Advanced Threat Protection (ATP) can now assess the collective security configuration state of devices on an enterprise network with the help of a new feature dubbed Microsoft Secure Score for Devices. [...]
https://www.bleepingcomputer.com/news/security/microsoft-defender-atp-now-helps-secure-network-devices/
Microsoft Defender Advanced Threat Protection (ATP) can now assess the collective security configuration state of devices on an enterprise network with the help of a new feature dubbed Microsoft Secure Score for Devices. [...]
https://www.bleepingcomputer.com/news/security/microsoft-defender-atp-now-helps-secure-network-devices/
BleepingComputer
Microsoft Defender ATP now helps secure network devices
Microsoft Defender Advanced Threat Protection (ATP) can now assess the collective security configuration state of devices on an enterprise network with the help of a new feature dubbed Microsoft Secure Score for Devices.