Newsfeed - ThreatWarrior

Breaking News

Stay up to date on cyber security news across the industry with our currated newsfeed.

Microsoft Implements Windows Zerologon Flaw ‘Enforcement Mode’

Starting Feb. 9, Microsoft will enable Domain Controller “enforcement mode” by default to address CVE-2020-1472.

NSA Releases Guidance on Encrypted DNS in Enterprise Environments  

Original release date: January 15, 2021

The National Security Agency (NSA) has released an information sheet with guidance on adopting encrypted Domain Name System (DNS) over Hypertext Transfer Protocol over Transport Layer Security (HTTPS), r

Apple Kills MacOS Feature Allowing Apps to Bypass Firewalls

Security researchers lambasted the controversial macOS Big Sur feature for exposing users' sensitive data.

Google Boots 164 Apps from Play Marketplace for Shady Ad Practices

The tech giant removes 164 more offending Android apps after banning software showing this type of behavior from the store last year.

Apache Releases Security Advisory for Tomcat

Original release date: January 15, 2021

The Apache Software Foundation has released a security advisory to address a vulnerability affecting multiple versions of Apache Tomcat. An attacker could exploit this vulnerability to obtain sensitive i

Europol announces bust of “world’s biggest” dark web marketplace

Dark web servers are hard to find - but not impossible.

Florida Ethics Officer Charged with Cyberstalking

Judge bars former Tallahassee city ethics officer from internet-connected devices after her arrest for cyberstalking.

Telegram Bots at Heart of Classiscam Scam-as-a-Service

The cybercriminal service has scammed victims out of $6.5 million and continues to spread on Telegram.

Cloud Attacks Are Bypassing MFA, Feds Warn

CISA has issued an alert warning that cloud services at U.S. organizations are being actively and successfully targeted.

Get a Demo

Let our team of security experts show you how ThreatWarrior can help you see everything happening on your network, learn behaviors and patterns, and act efficiently to stop threats other solutions miss.