Microsoft’s Latest Attack Ad Rips Into the iPad Pro

It might be 2021, but to someone in Microsoft’s marketing department it may as well be the 1990s all over again. That’s because the Redmond, Washington-based company is slamming Apple products in its new ads—harking back to the time when Microsoft and Apple were headed up by fierce rivals Bill Gates and Steve Jobs, rather […]

Continue Reading

Acer Has Been Hit With a $50 Million Ransomware Attack

Acer has been the target of a REvil ransomware attack, with the attackers demanding $ 50 million from the company to decrypt the data and not leak sensitive information on the web. This makes it the ransom demands ever made by a ransomware group. The REvil ransomware group is one of the most notorious hacking […]

Continue Reading

Homeland Security Declares Microsoft Exchange Attack "Emergency"

Homeland Security has declared an ongoing attack against Microsoft Exchange as an emergency. The attacks, which began earlier this week, target Microsoft Exchange Servers, stringing together several zero-day exploits to access secure email accounts. Homeland Security: Attack Is “Unacceptable Risk” Homeland Security issued Emergency Directive 21-02 late on March 3, delivering some background information on […]

Continue Reading

What Is a Man-in-the-Middle Attack?

A man-in-the-middle attack is difficult to identify and defend against. MITM attacks depend on controlling the lines of communication between people, computers, or servers. Man-in-the-middle attacks don’t always require an infected computer, meaning there are multiple avenues of attack. So, what is a man-in-the-middle attack, and how can you prevent yourself from falling prey to […]

Continue Reading

Leading Cybersecurity Firm FireEye Hit by Nation-State Attack

US cybersecurity firm FireEye is the victim of a hack delivered by a “highly sophisticated threat actor.” The firm confirmed that a trove of their own offensive hacking tools was stolen in the attack, meaning the hackers can potentially repurpose these tools in their offensive hacks. Cybersecurity firms with global renown are frequently high-value targets […]

Continue Reading