ClickCease cyber threats Archives - Page 8 of 8 - TuxCare

Researchers uncovers critical vulnerabilities in...

Security researchers from cybersecurity firm Wiz have uncovered a new type of attack that enables hackers to bypass authentication and take over user accounts in various Microsoft applications. The research...

Tax scammers use Trojan Emotet...

According to Malwarebytes, tax fraudsters are on the rise courtesy of the “Trojan Emotet” to carry out their operations. It is capable of intercepting network traffic and steal data, such...

Maintaining Cyber Hygiene in the...

Reaching an acceptable level of cyber hygiene is a challenge for all healthcare providers, hospitals, and pharmaceutical companies. Many security breaches occur with legacy systems and redundant processes that often...

Identify, mitigate & prevent buffer...

Buffer overflow vulnerabilities are still a common route by which cyber criminals get illegal access to computer systems. It’s a growing problem too as there is a steady year-on-year increase...

Reduced Time to Exploit Is...

We need an opportunity to achieve our cybersecurity goals. The tighter this window, the harder it becomes to do our cybersecurity jobs. Recent reports stating that the time to exploit...

FBI, CISA and HHS warns...

The FBI and the Cybersecurity and Infrastructure Security Agency (CISA) have issued a warning about a new ransomware gang known as Royal ransomware. The ransomware is a type of malicious...

State Actors May Be Targeting...

Infrastructure is at the core of any business – whether it’s a pipeline for liquids, a data center, or the development process you’ve taken years to build. An organization that...

Fighting Denial-of-Service at the...

Denial of Service (DoS) attacks are a special type of cybersecurity threat. The attacker does not need to hack your systems or find a gap in your security posture. The...

Firebrick Ostrich uses open-source tactics...

Abnormal Security discovered a new business email attack threat actor known as “Firebrick Ostrich” performing Business email compromise (BEC) on a near-industrial scale. It also employs a stealth strategy to...

Modernizing Vulnerability Management at Higher...

Colleges and universities are heavily targeted by cybercriminals that seek to exploit vulnerabilities and trick staff members to infect systems with malware, spyware, and ransomware. In order to protect their...

Mail

Join

4,500

Linux & Open Source
Professionals!

Subscribe to
our newsletter