The cyber extortionists exploit a known vulnerability in a Windows graphics driver. They then manipulate drivers of anti-virus software. This way, the BlackByte group can access systems of its victims undisturbed.

The cyber extortionists exploit a known vulnerability in a Windows graphics driver. They then manipulate drivers of anti-virus software. This way, the BlackByte group can access systems of its victims undisturbed.
They are part of a large-scale malvertising campaign. 75 apps find their way into the Play Store. 10 more apps make it into the Play Store.
The hacker gained access to vulnerability reports and shared screenshots of internal systems, the email dashboard, and Slack server.
Recent study by Mimecast highlights level of security threats in healthcare.
A security function blocks third-party printer cartridges. HP is retrofitting the function to some printers via a firmware update. So far, only customers in Belgium, Italy, Spain and Portugal are receiving compensation.
In his guest article, Yaroslav Rosomakho from Netskope explains how cybercriminals work and how companies can arm themselves against them.
Windows computers that support the VAES instruction set are affected. An update temporarily reduces the performance of AES-based operations significantly.
The top malware strains include remote access Trojans (RATs), banking Trojans, info stealers and ransomware.
HP Wolf Security Report reveals new techniques and phishing lures used to deceive employees.
Groups LockBit, Hive and BlackCat compromised the network within about two weeks. Apparently, they each use the same hacked RDP connection. Only after the third attack the company approached Sophos for help.
Unknown persons penetrate the company's network. Beforehand, they hacked the Google account of a Cisco employee and obtained VPN access data. The ransomware group Yanluowang claims responsibility for the attack.
The August patchday brings fixes for five critical vulnerabilities. All supported Android versions up to and including Android 12 and 12L are vulnerable. Samsung starts distributing the August updates already in July.
Three quarters of respondents believe recent changes in working practices have had a negative impact on their company's cyber security.
The education sector suffers from the highest data encryption rate and the longest recovery time worldwide.
Weiter anhaltende Lieferprobleme bei Atos - Bundesamt für Bevölkerungsschutz kündigt Freigabe des generalüberholten Sicherheitsfunks jetzt für Oktober an.
Security awareness trainings sensitise the entire team to phishing, ransomware and secure remote working.
RiskIQ has conducted a study on the financial scope of malicious activity on the Internet.
Lockdown Mode is designed to protect users from government hacking attacks. Mode restricts certain functions such as receiving file attachments and Facetime calls.
Group uses technique to bypass blocking of their URLS. Huge growth in phishing attacks compared to 2022.
Leitfaden für Reseller wie sich Sicherheits- und Business-Intelligence-Vorteile erschließen und Kostensteigerungen vermindern lassen.
Trend Micro founds subsidiary for more cyber security in the automotive sector.
The target is a subsidiary of Darmstadt-based energy supplier Entega. The hackers bring the company's website and e-mail system to a standstill. The Mainz municipal utility is also affected.
On average, the attacks caused damage of 2.9 million euros.
Spear phishing attackers use psychological tricks to entice their victims to quickly click on fraudulent mails, warns David Kelm of IT-Seals.
For many employees, being able to work at home on a computer is an advantage. However, remote working does not make IT security any easier.
Voice assistants are practical, but in the home office they pose risks in terms of security and data protection, warns the R+V Versicherung Infocenter.
Recommendation issued jointly by the U.S., Canada, New Zealand, Netherlands and the U.K. provides guidance on mitigating vulnerabilities.
Number of threats detected from malicious Emotet spam campaigns rises 27 per cent.
25 out of 32 apps examined do not even meet the minimum standards. Mozilla rates only two apps as good. Researchers call it the worst product category they've studied so far.
Companies should know the security status of suppliers in the supply chain. But the assessment is complex. Security ratings as a service can provide support. An overview.