Microsoft Teams bug allowing phishing unpatched since March

Microsoft Teams bug allowing phishing unpatched since March . Microsoft said it won’t fix or is delaying patches for several security flaws impacting Microsoft Teams’ link preview feature reported since March 2021. German IT security consultancy firm Positive Security’s co-founder Fabian Bräunlein discovered four vulnerabilities leading to Server-Side Request Forgery (SSRF), URL preview spoofing, IP

Ransomware Shut Down McMenamins Phone and Credit Card Systems

Ransomware Shut Down McMenamins. Ransomware and malware attacks are hamstringing some major institutions in Oregon , USA. Last week, pub and hotel chain McMenamins suffered a ransomware attack that left its employees’ personal information potentially compromised. (Ransomware is the work of hackers who seize company computer systems and demand payment.) Headquarters today told WW that

New Fileless Malware Uses Windows Registry as Storage to Evade Detection

There is a New Fileless Malware that Uses Windows Registry as Storage to Evade Detection .A new JavaScript-based remote access Trojan (RAT) propagated via a social engineering campaign has been observed employing sneaky “fileless” techniques as part of its detection-evasion methods to elude discovery and analysis. Dubbed DarkWatchman by researchers from Prevailion’s Adversarial Counterintelligence Team

Kronos hit with ransomware, warns of data breach and ‘several weeks’ outage

According to ZDNet HR management platform Kronos has been hit with a ransomware attack, revealing that information from many of its high-profile customers may have been accessed.  UKG, Kronos’ parent company, said the vital service will be out for “several weeks” and urged customers to “evaluate and implement alternative business continuity protocols related to the

Hackers found infecting ‘free’ Windows activators like KMSPico to steal from cryptocurrency wallets

Why it matters: Software piracy isn’t new, but with the proliferation of “activators” for Windows and Office, you also have malicious actors scrambling to take advantage of unsuspecting users who utilize such tools. Their victims do this believing they save on software licensing costs, but at the same time, they expose their systems to sophisticated