2020 Brings New Attacks That Survive OS Reinstallation
Michael Kan of PC Mag reports on a new attack that can persist after reinstalling your operating system. -Article
Michael Kan of PC Mag reports on a new attack that can persist after reinstalling your operating system. -Article
Thomas Claburn of The Register reports on Microsoft's response to hosted solution outage last week. -Article
Zachary Comeau of My Tech Decisions reports on the new climate of cyber threats. -Article
Ionut Arghire of Security Week reports on a data breach at GoDaddy. -Article
Kacy Zurkus of InfoSecurity reports on lack of transparency regarding ownership of VPN services Let’s talk if you are using ...
Dan Goodin of Ars Technica reports on a Zoom vulnerability. -Article
DH Kass of MSSP Alert reports on cyber-threats to remote workers. -Article
Sergiu Gatlan reports on new malware delivery method. -Article
Catalin Cimpanu of Zero Day reports on an attack targeting Google Authenticator app. -Article
Brien Posey of ITPro Today reports on old method being used to deliver new threats. -Article