#WeeklyCybersecurityTip: Use a strong mix of characters for your passwords!

Download newsletter here. To receive these direct to your inbox, sign up here.

1- Log4Shell explained – how it works, why you need to know, and how to fix it

In this article, we explain the Apache Log4Shell vulnerability in plain English, and give you some simple educational code that you can use safely and easily at home (or even directly on your own servers) in order to learn more. Just to be clear up front: we’re not going to show you how to build a w… Read more

2- Emergency Chrome Update to Fix zero-day Exploited in the Wild

Google recently updated the Chrome browser and released the latest version Chrome 96.0.4664.110 with the patch for a critical zero-day vulnerability that was exploited in the wild and other four security flaws. This latest version of Chrome is released for all the major platforms:- WindowsMacLinux T… Read more

3- Actively Exploited Microsoft Zero-Day Allows App Spoofing, Malware Delivery

Microsoft has addressed a zero-day vulnerability that was exploited in the wild to deliver Emotet, Trickbot and more in the form of fake applications. The patch came as part of the computing giant’s December Patch Tuesday update, which included a total of 67 fixes for security vulnerabilities. The p… Read more

4- Relentless Log4j Attacks Include State Actors, Possible Worm

Call it a “logjam” of threats: Attackers including nation-state actors have already targeted half of all corporate global networks in security companies’ telemetry using at least 70 distinct malware families — and the fallout from the Log4j vulnerability is just beginning. Researchers manning keyboa… Read more

Our Newsletter

Sign up to learn about the latest threats, hacking methods, and news.