MonthAugust 2019

@jack Got Hacked: Twitter CEO’s Tweets Hijacked

Twitter CEO Jack Dorsey's Twitter account was, apparently, hijacked for roughly 20 minutes and used for a racist rant.

@jack Got Hacked — Twitter CEO’s Tweets Hijacked

Twitter CEO Jack Dorsey's Twitter account was, apparently, hijacked for roughly 20 minutes and used for racist rant.

New Credential-Theft Attack Weaponizes DNS

The recently discovered campaign sends stolen data out of the network as part of a DNS query.

New Credential-Theft Attack Weaponizes DNS

The recently discovered campaign sends stolen data out of the network as part of a DNS query.

Microsoft Patch Alert: Full of sound and fury, signifying nothing

What happens when Microsoft releases eight – count ‘em, eight – concurrent beta test versions of Win10 version 1909 without fixing bugs introduced into 1903 on Patch Tuesday?

Pan. De. Moaaan. Ium.

The VB/VBA/VBScript debacle

No doubt, you recall the first wave of pain inflicted by the August 2019 patching regimen. Microsoft somehow managed to mess up Visual Basic (an old custom programming language), Visual Basic for Applications (for Office macros) and VBScript (a largely forgotten language primarily used inside Internet Explorer). Folks running applications in any of those languages would, on occasion, receive “invalid procedure call error” messages when using apps that had been working for decades.

To read this article in full, please click here

Google Uncovers Massive iPhone Attack Campaign

A group of hacked websites has been silently compromising fully patched iPhones for at least two years, Project Zero reports.

Overburdened SOC Analysts Shift Priorities

Many SOC analysts are starting to shut off high-alert features to keep pace with the volume, new study shows.

‘It Saved Our Community’: 16 Realistic Ransomware Defenses for Cities

Practical steps municipal governments can take to better prevent and respond to ransomware infections.

To Navigate a Sea of Cybersecurity Solutions, Learn How to Fish

Three steps for relieving the pressure of picking the right tools.

To Navigate a Sea of Cybersecurity Solutions, Learn How to Fish

Three steps for relieving the pressure of picking the right tools.