Bitdefender offers free decryptor for REvil ransomware victims

The free decryption tool will help victims restore their encrypted files from attacks made before July 13, 2021, says Bitdefender. Image: Nature, Getty Images/iStockphoto Organizations that were compromised by REvil ransomware can now download and run a free tool to decrypt their hijacked files. In a blog post published Thursday,

0 Comments

Microsoft Patch Tuesday fixes actively exploited zero‑day and 85 other flaws

The most recent Patch Tuesday includes a fix for the previously disclosed and actively exploited remote code execution flaw in MSHTML. The arrival of the second Tuesday of the month can only mean one thing in cybersecurity terms, Microsoft is rolling out patches for security vulnerabilities in Windows and its other

0 Comments

Travis CI Flaw Exposes Secrets of Thousands of Open Source Projects

Continuous integration vendor Travis CI has patched a serious security flaw that exposed API keys, access tokens, and credentials, potentially putting organizations that use public source code repositories at risk of further attacks. The issue — tracked as CVE-2021-41077 — concerns unauthorized access and plunder of secret environment data associated

0 Comments

You can now eliminate the password for your Microsoft account

By using an alternative means of authentication, you can now go passwordless on your Microsoft account. Image: Daniel Chetroni/Shutterstock Those of you who use a Microsoft account to sign into Windows, Office, Outlook or other Microsoft apps and services can now fully jettison your password as another step toward a

0 Comments

How to protect your on-premises databases from security vulnerabilities

One out of every two on-premises databases has at least one vulnerability, according to a study from Imperva Research Labs. Image: iStock/GaudiLab Exploiting security flaws is one of the major tactics used by cybercriminals to attack organizations. Vulnerabilities are an unfortunate fact of life for operating systems, applications, hardware devices

0 Comments

WhatsApp announces end‑to‑end encrypted backups

The Facebook-owned messaging service plans to roll out the feature to both iOS and Android users in the coming weeks. While users already had the option to back up their message history using cloud-based services, they will soon be able to store their backups end-to-end encrypted (E2EE), WhatsApp has announced. The

0 Comments

No Patch for High-Severity Bug in Legacy IBM System X Servers

The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy policy. In addition, you will find them in the message confirming the subscription to the newsletter.

0 Comments

Critical Flaws Discovered in Azure App That Microsoft Secretly Installed on Linux VMs

Microsoft on Tuesday addressed a quartet of security flaws as part of its Patch Tuesday updates that could be abused by adversaries to target Azure cloud customers and elevate privileges as well as allow for remote takeover of vulnerable systems. The list of flaws, collectively called OMIGOD by researchers from

0 Comments

Dark Web sees spike in fake COVID vaccine card sales

Dark Web sees spike in fake COVID vaccine card sales Length: 7:24 | Sep 14, 2021 Some people would rather pay money for a phony vaccine card than get the actual shot for free, according to Check Point Research.

0 Comments

T-Mobile was breached: Here’s how to protect your account

T-Mobile was breached: Here’s how to protect your account Length: 9:43 | Sep 14, 2021 T-Mobile customers should change their password and PIN and set up two-step verification to protect their accounts.

0 Comments