New Phishing Attacks Use HTML Email Attachments
HTML attachments as an attack vector may seem a little old school. However, according to statistics compiled by Kaspersky Lab indicates…
HTML attachments as an attack vector may seem a little old school. However, according to statistics compiled by Kaspersky Lab indicates…
Do you own and manage a WordPress site either personally or as part of your business? Do you also use the…
The Cybersecurity and Infrastructure Security Agency (CISA) has issued an advisory that serves as a stark warning. If you’re using VMware…
If you’re not familiar with the term, a Zero Day exploit is a security flaw that the software vendor is not…
Phishing campaigns get more effective the more closely they can imitate a trusted source. Recently, security researchers at Fortinet discovered evidence…
Security researchers employed by Microsoft have recently spotted a variant of the Sysrv botnet. They have dubbed the new variant Sysrv-K….
Did you know that 93% of all businesses – that don’t have a disaster recovery plan in place when they experience…
HP recently released a BIOS update to address a pair of high-severity vulnerabilities that affect a wide range of PC and…
Do you use a Zyxel firewall? If so, there’s good news. The company has fixed an issue you may not have…
It is the end of an era. Apple recently announced that they were discontinuing the legendary iPod, which is now in…