Blog: Technology and Cybersecurity News
-
LastPass, A Widely-Used Password Manager, Suffers Data Breach
LastPass, a widely-used and recognized password manager from LogMeIn, recently made an announcement of a recent security breach. On their official blog, they acknowledged unusual activity within a third-party cloud storage service and stated steps…
-
Google Chrome Releases New Update 107 With Security, Performance Updates
Google has announced the release of Google Chrome version 107. This new Chrome, available for desktop and mobile (Android, iOS), brings many security and performance updates such as HEVC hardware decoding which may help with…
-
Microsoft Confirms Reports Misconfigured Storage Location Causing Possible Leak
Microsoft last week confirmed in an advisory on a Microsoft Security Response Center post a report by SOCradar of a misconfigured Microsoft endpoint that was not in current use possibly exposing over 65,000 organizations’ data.…
-
WordPress Releases 6.0.3 With Secure Fixes, Patches
WordPress 6.0.3, the latest security release, is out and now available to all WordPress websites. If your site supports automatic updates, it will be automatically updated. You can also manually update within your dashboard =>…
-
Fortinet Releases Patch for Auth Vulnerability Affecting FortiOS, FortiProxy, and FortiSwitchManager
Fortinet has released a patch an advisory on a recent critical authentication bypass vulnerabilities affecting FortiOS, FortiProxy, and FortiSwitchManager. The authentication bypass bug, CVE-2022-40684, allows an unauthenticated user to perform administrative functions through maliciously crafted…
-
Google Cloud Blocks Largest DDoS Attack Recorded
Google has recently reported that their Cloud Armor service blocked the largest DDoS attack ever recorded. A DDoS, or distributed denial-of-service is a malicious attack where excessive amounts of requests are sent to a target.…
-
Apple Releases Update Patching 2 Severe Vulnerabilities
Apple has released updates patching two critical vulnerabilities recently discovered. An application is able to use this vulnerability to run malicious code and gain Kernel privilege, which is the highest privilege allowing full control of…
Categories:
Have any comments or suggestions? Feel free to let us know!