7 VPNs that you thought were safe

7 VPNs that leaked their logs – the logs that “didn’t exist” VPNs are all the rage these days, because they’re supposed to boost your privacy and stop you being tracked. In fact, “VPN” has become a word in its own right, pronounced vee-pee-en, and it’s a crowded market with companies advertising online, on TV…

Read More

Major University In California Pays Ransome!

The University of San Francisco (UCSF) is the latest organization to fall victim to hackers, running afoul of a group utilizing the Netwalker ransomware strain. UCSF is a research university whose recent efforts have been focused on health sciences generally and COVID-19-related research specifically. On June 3rd, 2020, Netwalker published a notice on a site…

Read More

New Powerful Malware Is Targeting Windows-Based Machines

Researchers have discovered a devilishly clever new stain of malware currently in use by hackers around the world. The new strain is appropriately called “Lucifer,” and has been making life quite difficult for IT professionals managing Windows environments. The malware exploits critical vulnerabilities in Windows-based systems to launch DDoS attacks and install cryptojacking code. The…

Read More

Hackers Attacking Exchange Servers In New Warning From Microsoft

Recently, Microsoft’s Defender ATP Research Team issued guidance relating to defending against attacks that target Exchange servers. They are coming under increasing attack based on the latest Microsoft statistics, which show a marked increase in the use of web shells on on-premises Exchange servers. The company is currently tracking multiple ongoing attacks, some of which…

Read More

U.S. Senators Banning the Use of Strong Encryption

Last week, Republican U.S. Senators introduced the Lawful Access to Encrypted Data Act “ending the use of ‘warrant-proof’ encrypted technology by terrorists and other bad actors to conceal illicit behavior.” Experts and privacy advocates think it can effectively outlaw strong encryption. As the name may suggest, the Lawful Access to Encrypted Data Act (LAED Act,…

Read More