Weekly Cyber News Updates – week 38 of 2022

Weekly Cyber News Updates – week 38 of 2022

Staying a step ahead of threat actors requires understanding how they attack individuals online. Here we are with this week’s top cybersecurity news from around the world. From malware spreading images to royal ransoms, SMS phishing surges to crypto job applications delivering mac malware, and Russian cyberattacks to cybercriminals apologizing for data breaches, let us see what the cybersecurity world has been to.

(more…)

Two Zero Day Vulnerabilities Discovered in Microsoft Exchange Server, Patches Pending

Two Zero Day Vulnerabilities Discovered in Microsoft Exchange Server, Patches Pending

Microsoft Exchange Server has two unpatched zero day vulnerabilities that allow threat actors to execute code remotely and forge server-side requests. This text shares the details of the 0-day vulnerabilities, how they came to light, how the attack method works, how Microsoft is handling the security patches, and what you can do to protect yourself from the Microsoft Exchange Server vulnerabilities.

(more…)

Weekly Cyber News Updates – week 37 of 2022

Weekly Cyber News Updates – week 37 of 2022

Cybersecurity has become an ever-increasing challenge with new ransomware, malware, data breach, and cyber threats occurring routinely to target the digital world and personal data. And to stay protected, it is best to keep up with cybersecurity’s latest. From stolen crypto to credit card fraud, and phishing campaigns to state-sponsored attacks and ransomware, here are the top cybersecurity headlines of this week.

(more…)

Two Zero Day Vulnerabilities Discovered in Microsoft Exchange Server, Patches Pending

Microsoft Discovers European Cyber Mercenary Targeting Windows and Adobe Zero Day Vulnerability

Microsoft has discovered a PSOA, a cyber mercenary organization with sophisticated hiring tools that can allow threat actors to exploit Windows and Adobe vulnerabilities for malicious activities. This article looks at KNOTWEED, the identified threat, what it is, how KNOTWEED works, and how you can identify and protect yourself from KNOTWEED. (more…)

Cyber Security News Update – Week 25 of 2022

Cyber Security News Update – Week 25 of 2022

Since cyberattacks are becoming more and more common these days, staying abreast of the latest news headlines is important to learn from them and keep our information assets secure. This week’s cybersecurity news headlines cover some significant patches and fixes. Read on to find out what’s happening in cyberspace. (more…)

Two Zero Day Vulnerabilities Discovered in Microsoft Exchange Server, Patches Pending

What Is Dkim And Why You Should Use It To Secure Your Email

Digital keys are the keys to email authentication, which basically means they verify you’re actually the person who sent the email you claim to be. While Google, Yahoo, and Microsoft all offer their own versions of digital keys, the most popular one is DKIM, which stands for DomainKeys Identified Mail. Basically, DKIM is a set of parameters for digital keys, which let email recipients know they are who they claim to be. Because the DKIM keys are stored in servers, the authentication works even if your email is hacked.

(more…)

Pin It on Pinterest