
Browse all articles
March 30, 2022
Urgent update issued for Google Chrome
Google has issued an update for its Chrome browser that patches the second "high severity" zero-day vulnerability this year. All 3.2 billion Chrome users are urged to update to Chrome 99.0.4844.84 for Windows, Mac, or Linux immediately.
March 30, 2022
Victims report cybercrime losses of $6.9 billion in 2021
The FBI's Internet Crime Report for 2021 contains statistics from 847,376 complaints, corresponding to more than $6.9 billion in losses. That represents a 7% increase from 2020.
March 25, 2022
Ransomware derails Italian train operations
The latest in a string of ransomware attacks has hit the computer systems of Italian railway operator Trenitalia, causing disruptions to ticket purchasing as well as the tablets and applications used by onboard staff members.
March 25, 2022
Lapsus$ extortion gang takes on Microsoft, Okta
Tech giant Microsoft and secure identity platform Okta have both joined the ranks of high-profile organizations that have recently fallen victim to the Lapsus$ extortion gang.
March 24, 2022
New version of Gimmick malware targets macOS
Researchers have discovered a previously unknown variant of the Gimmick malware targeting Mac systems. Gimmick is believed to be a form of spyware from a Chinese threat actor called Storm Cloud. This ongoing campaign takes aim at both macOS and Windows, and aims to be stealthy and hard to spot.
March 19, 2022
Faulty update causes Microsoft Defender to flag Office as ransomware
After a recent Microsoft Defender for Endpoint update, administrators started to receive multiple ransomware alerts on clean system files in relation to Office updates.
March 16, 2022
WhisperGate malware targets Ukrainian government sites
Multiple government sites in Ukraine were shut down on January 13, 2022, the result of a large-scale cyberattack by the WhisperGate malware. Microsoft Intelligence named this activity "DEV-0586" and identified it as destructive malware that used to be ransomware. Its main purpose is to disrupt the system and damage files beyond the possibility of their recovery.






