Breaking News
Stay up to date on cyber security news across the industry with our currated newsfeed.
Microsoft Implements Windows Zerologon Flaw ‘Enforcement Mode’
Starting Feb. 9, Microsoft will enable Domain Controller “enforcement mode” by default to address CVE-2020-1472.
NSA Releases Guidance on Encrypted DNS in Enterprise Environments
Original release date: January 15, 2021
The National Security Agency (NSA) has released an information sheet with guidance on adopting encrypted Domain Name System (DNS) over Hypertext Transfer Protocol over Transport Layer Security (HTTPS), r
Apple Kills MacOS Feature Allowing Apps to Bypass Firewalls
Security researchers lambasted the controversial macOS Big Sur feature for exposing users' sensitive data.
Google Boots 164 Apps from Play Marketplace for Shady Ad Practices
The tech giant removes 164 more offending Android apps after banning software showing this type of behavior from the store last year.
Apache Releases Security Advisory for Tomcat
Original release date: January 15, 2021
The Apache Software Foundation has released a security advisory to address a vulnerability affecting multiple versions of Apache Tomcat. An attacker could exploit this vulnerability to obtain sensitive i
Europol announces bust of “world’s biggest” dark web marketplace
Dark web servers are hard to find - but not impossible.
Florida Ethics Officer Charged with Cyberstalking
Judge bars former Tallahassee city ethics officer from internet-connected devices after her arrest for cyberstalking.
Telegram Bots at Heart of Classiscam Scam-as-a-Service
The cybercriminal service has scammed victims out of $6.5 million and continues to spread on Telegram.
Cloud Attacks Are Bypassing MFA, Feds Warn
CISA has issued an alert warning that cloud services at U.S. organizations are being actively and successfully targeted.
S3 Ep15: Titan keys, Mimecast certs and Solarwinds [Podcast]
Latest episode. Listen now!
Get a Demo
Let our team of security experts show you how ThreatWarrior can help you see everything happening on your network, learn behaviors and patterns, and act efficiently to stop threats other solutions miss.