Weekly round-up: 1 – 5 August
This week, we saw that the notorious cybercriminal group, LockBit is shifting its focus from VMware to Windows. LockBit 3.0 now uses a legitimate Windows Defender command line...
Home > Article
This week, we saw that the notorious cybercriminal group, LockBit is shifting its focus from VMware to Windows. LockBit 3.0 now uses a legitimate Windows Defender command line...
Firewalls are one of the most important parts of a network security system. In simplest terms, a firewall is a digital wall placed between the internal and external...
What is Ransomware? Ransomware is a type of malware that focuses on preventing victims from accessing the data, such as files, databases, or applications, by using encryption methods...
This week, Fedora announced its decision to change the classification of CC0. Fedora will no longer allow software licensed under the Creative Commons "No Rights Reserved" license. Also...
We have many gaming-oriented peripherals around our PCs, including monitors, keyboards, chairs, and even speakers. So, the next step is the gaming desks. They are mostly aiming to...
This week, we had the first glimpse of GNOME 43. The GNOME team announced the release of GNOME 43 alpha. GNOME 43 alpha comes with improvements in the...
Data center virtualization is a process that includes designing, developing, deploying, and transferring data centers by using a hypervisor. Virtualized data center, also known as software-defined data centers,...
This week had brought us some interesting news as AMD and Intel chips are once again found vulnerable; affecting Linux-based operating systems and named Retbleed. In the meantime,...
This week, HackerOne announced that one of its employees was caught stealing reports submitted by users and publishing them online for personal gain. The company announced that after...
This week, Mitre published the 2022 Common Weakness Enumeration Top 25 Most Dangerous Software Weaknesses list. This year, there are 3 new entries in the Top 25. The...
As the name suggests, data is what makes a data center valuable. Security, integrity, and accessibility of data are also crucial for a data center. It is also...
This week, engineers of Meta published a blog post claiming that with Transparent Memory Offloading, they could save 20% to 32% of memory per Linux server. TMO is...
Hackers are one of the most mysterious and catchy characters in a movie, due to the nature of their expertise. For many years, Hollywood depicted hackers are either...
This week, the software giant, Microsoft announced the general availability of Microsoft Defender for Individuals with Microsoft 365 Personal and Family subscriptions. The new solution is built on...
Finding the perfect gift for your dad is not an easy task, especially if you are looking for a unique gift he can use every day. Whether he...
This week, Microsoft was still struggling with vulnerabilities. Security researchers stated that cybercriminals are exploiting the vulnerability to target European and U.S. local governments. We also had a...
One of the most important of the week was a new botnet, named EnemyBot, that targets three critical VMware and F5 BIG-IP vulnerabilities to launch distributed denial-of-service attacks....
This week's most important news was the release of WordPress 6.0. WordPress 6.0 “Arturo” fixes more than 500 bugs and brings more than 400 updates/enhancements. This week, Linux...
One more week has passed and now, we are here again with this week's tips and tricks. Today we are going to deliver some useful tricks that might...
Zyxel published a security advisory for multiple vulnerabilities found in firewalls, AP controllers, and APs. The company advised users to install the updates for optimal protection. Zyxel also...
This week's most important release is Kali Linux 2022.2 which brings additional tools. The tension between Russia and Ukraine also continues. Pro-Russian hackers attacked the Eurovision song contest....