by bct2mastertemp | Jun 8, 2022 | Blog
Phishing campaigns get more effective the more closely they can imitate a trusted source. Recently, security researchers at Fortinet discovered evidence of a phishing campaign that specifically targets Microsoft Windows users and installs three different types of...
by bct2mastertemp | Jun 7, 2022 | Blog
Security researchers employed by Microsoft have recently spotted a variant of the Sysrv botnet. They have dubbed the new variant Sysrv-K. This new variant works in two ways. First, it exploits a flaw in the Spring Cloud Gateway that allows remote code execution...
by bct2mastertemp | Jun 6, 2022 | Blog
HP recently released a BIOS update to address a pair of high-severity vulnerabilities that affect a wide range of PC and notebook products offered by the company. In both cases, the vulnerabilities would allow an attacker to execute code arbitrarily and with Kernel...
by bct2mastertemp | Jun 4, 2022 | Blog
Do you use a Zyxel firewall? If so, there’s good news. The company has fixed an issue you may not have even been aware that you had. The company pushed out the fix in a silent update a little over two weeks ago, but when they implemented the push, they...
by bct2mastertemp | Jun 3, 2022 | Blog
It is the end of an era. Apple recently announced that they were discontinuing the legendary iPod, which is now in its 7th generation of production. When first released more than fifteen years ago, the iPod was an instant smash hit that almost singlehandedly created...
by bct2mastertemp | Jun 2, 2022 | Blog
If you’re a member of the Windows Insiders group, then you are likely already aware of this. If not, here’s something else to look forward to when Windows 11 is formally released. Microsoft has been experimenting with a new “Suggested Actions”...