Israel Responds To Cyber Attack With Air Strike On Cyber Attackers In World First
Original release date: May 16, 2019
Microsoft has released security updates to address a remote code execution vulnerability in the following in-support and out-of-support operating systems:
- In-support systems: Windows 7, Windows Server 2008 R2, and Windows Server 2008
- Out-of-support systems: Windows 2003 and Windows XP!!
A remote attacker could exploit this vulnerability to take control of an affected system. The Cybersecurity and Infrastructure Security Agency (CISA) encourages users and administrators to review the Microsoft Security Advisory and Microsoft Customer Guidance for CVE-2019-0708 and apply the necessary updates.
Artificial Intelligence has become one of the most overused buzzwords in the cybersecurity field. Cybersecurity buzzwords gain more traction as the world of cybersecurity becomes more omnipresent in our cultural consciousness.
With hype around blockchain fading, organizations are starting to seek out use cases for the technology, according to Gartner.
Scammers are always thinking of new ways to steal your personal information, and now they’re employing a new trick: Form-jacking. Form-jacking places a virus on a commercial website to steal your information as you’re making a legitimate transaction. Learn how it works and how you can prevent it.
The malware, dubbed Exodus, records and steals all manner of data and leaves phones vulnerable to further hacking and data tampering.
Downgrade attack lets any user take over – just ask for old-style access to the debugging port and you won’t need a password.
There’s growing interest in social networks that prioritize user control. Two of the popular ones are Mastodon and Diaspora.
Court order in hand, Microsoft seized control of the hacker group’s (which it calls Phosphorous) phishing sites.