• HomeAbout usArticlesTRU EventsAcronis.com

TRU Security

Updates from Acronis Threat Research Unit

HomeAbout usArticlesTRU EventsAcronis.com
TRU Security
All articles
All articles
Follow us on
  • facebook
  • twitter
  • yt
  • linkedin
  • spiceworks
  • reddit
  • rss
Filter news by
Product
  • All
  • Acronis Cyber Backup
  • Acronis Snap Deploy
  • Acronis Files Connect
  • Acronis Disk Director Business
  • Acronis True Image 2021
  • Acronis Cyber Cloud
  • Acronis Cyber Infrastructure
  • Acronis Backup Advanced for vCloud
  • Acronis Monitoring Service
  • Acronis Cyber Cloud for Enterprise
  • Acronis VSS Doctor
  • Acronis Cyber Disaster Recovery
  • Acronis Disk Director
  • Acronis Cyber Notary Cloud
  • Acronis Revive
  • Acronis MassTransit
  • Acronis Cyber Files Cloud
  • Acronis Cyber Cloud Storage
  • Acronis Cyber Backup Cloud
  • Acronis Cyber Disaster Recovery Cloud
  • Acronis Cloud Manager
  • Acronis Cyber Files
  • Acronis Cloud Security
  • Acronis #CyberFit Score
  • Acronis Service Providers
  • Acronis Cloud Migration
  • Acronis AnyData Engine
  • Acronis Professional Services
  • Acronis Cyber Protect Cloud
  • Acronis Cyber Appliance
  • Acronis Cyber Protect
  • Acronis DeviceLock DLP
  • Acronis Ransomware Protection
  • Acronis Detection and Response
  • Acronis True Image
  • Acronis Cyber Protect Connect
  • Acronis Compliance Navigator
  • Acronis True Image for Home
  • Acronis Cyber Protect for Enterprise
  • Acronis Cyber Protect Home & Business
  • Acronis Cyber Protect Home & Business
  • Acronis Cyber Protect for OT
  • No data
Year
  • All
  • 2025
  • 2024
  • 2023
  • 2022
  • 2021
  • No data
Month
  • All
  • January
  • February
  • March
  • April
  • May
  • June
  • July
  • August
  • September
  • October
  • November
  • December
  • No data
Search by tag
Cybersecurity
Ransomware protection
Malware protection
Cyberthreats
MSP cybersecurity
Threat detection
Phishing
Email security
Search by keywords
Browse Cybersecurity Articles
June 24, 2022
Two German energy providers hit by cyberattacks
The German energy provider Entega reported a cyberattack over the weekend, impacting their online services and the email accounts of the 2,000 employees. The critical infrastructure of the energy network was not compromised. Stadtwerke Mainz and a regional waste disposal company both reported issues as well.
June 22, 2022
Dozens of vulnerability fixes issued by Microsoft, Google
Microsoft's latest Patch Tuesday update covered 60 vulnerabilities, of which three were considered critical — meaning that they can be remotely exploited to gain full control of the machine. One of these three is the Follina vulnerability in the Microsoft Support Diagnostics Tool (MSDT), which has already been heavily exploited.
June 22, 2022
BlackCat gang lets potential victims check for their stolen data
The BlackCat extortion gang, also known as ALPHV, has taken the data leak site to a whole new level — providing a way for individuals to check if their personal information was included in batches of stolen data.
June 15, 2022
MSDT "Follina" vulnerability exploited in attacks against U.S., European governments
An unpatched remote code execution vulnerability in the Microsoft Windows Support Diagnostic Tool (MSDT), which is being tracked as CVE-2022-30192, is being exploited in phishing campaigns that are targeting U.S. and European government organizations.
June 14, 2022
Vice Society ransomware hits Italian city of Palermo
Palermo, a city of 1.3 million people and a popular tourist destination in Southern Italy, has become the latest victim of a Vice Society ransomware attack.
June 14, 2022
Black Basta ransomware gang teams up with Qbot
First appearing on the scene as a banking trojan in 2007, Qbot has since expanded to become a powerful botnet threat that frequently works with ransomware gangs. Now the group can count Black Basta as their latest partner.
June 09, 2022
Critical "Follina" vulnerability being actively exploited, enabling malicious Microsoft Word files
A new Windows vulnerability, dubbed CVE-2022 30190 (or "Follina"), allows attackers to create a Word document that will execute malicious code through the MSDT protocol when a user opens the file in Preview mode.
123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869
Engage with TRU Security (RSS Feed Reader required)
  • cpoc
  • Legal information
  • Privacy policy
  • Acronis Cookie Notice
  • Notice of collection
© 2003–2025 Acronis International GmbH.
  • Deutsch
  • English
  • Español
  • Francais
  • Italiano
  • 日本語
  • Dutch
  • Português
  • Svenska
  • No data