16-year-old security bug affects millions of HP, Samsung and Xerox printers

0 3 min 3 mths

Details have emerged of a high severity security vulnerability affecting a software driver used in HP, Xerox and Samsung printers that has not been detected since 2005. Track as CVE-2021-3438 (CVSS score: 8.8), the issue is a buffer overflow in a print driver installation package […]

Cyber Security
0 4 min 3 mths

This new malware hides among Windows Defender exclusions to evade detection

Cyber ​​security researchers on Tuesday lifted the veil on a previously undocumented strain of malware dubbed “MosaicLoader“that sets people apart from researching pirated software as part of a global campaign. “The attackers behind MosaicLoader have created malware capable of delivering any payload to the system, […]

Cyber Security
0 4 min 3 mths

U.S., Global Allies Blame China for Massive Microsoft Exchange Attack

The US government and its main allies, including the European Union, the United Kingdom and NATO, have officially attributed the massive cyberattack on Microsoft Exchange mail servers to state-sponsored hacking teams working affiliated with the ministry of the State Security (MSS) of the People’s Republic […]

Cyber Security
0 1 min 3 mths

3 Ways to Improve Black Labor Market Outcomes

The racial gaps that exist between white and black Americans are staggering. From social injustices to economic disparities, black Americans face significant challenges in trying to thrive in life every day. […] The post office 3 Ways to Improve Black Labor Market Outcomes appeared first […]

Business
0 5 min 3 mths

Five Critical Password Security Rules Your Employees Ignore

According to Keeper Security’s Workplace Password Malpractice report, many remote workers do not follow password security best practices. Password security was an issue even before the advent of widespread remote working. So what happened after the pandemic? Keeper Security Workplace Password Error Report sought to […]

Cyber Security
0 2 min 3 mths

Researchers warn of Linux cryptojacking attackers operating from Romania

A threat group likely based in Romania and active since at least 2020 is behind an active cryptojacking campaign targeting Linux-based machines with an undocumented SSH brute-forcer written in Golang. Nicknamed “Crude dicotyledonous“, the password cracker would be distributed via a software as a service […]

Cyber Security
0 5 min 3 mths

3 Reasons Marketers Should Care About Data Security (& How To Get Started)

Over the past couple of years, you’ve probably heard a lot about cybersecurity. Like many big, serious-sounding concepts, it feels like it sometimes plays out over our heads – the territory of huge conglomerates and governments, or maybe your IT department. And, let’s face it, […]

Marketing Tips
0 3 min 3 mths

Low Risk iOS Wi-Fi Naming Bug Can Hack iPhones Remotely

The Wi-Fi network name bug that completely disabled an iPhone’s networking feature had remote code execution capabilities and was silently resolved by Apple earlier this year, new research shows. The denial of service vulnerability, which was revealed last month, stemmed from how iOS handled the […]

Cyber Security