New Vulnerabilities Threaten Backup Systems for Major Institutions

Uninterruptible power supply (UPS) devices are used for supplying backup power in case of an outage. These devices are used primarily in institutions such as hospitals, industrial systems, and server rooms. A new report spells bad news for these devices, specifically APC Smart-UPS devices, identifying three high-impact security vulnerabilities that could be exploited in an attack on these important systems. …

Hackers Steal Samsung Galaxy Source Code

Samsung announced on Monday, March 7, that hackers successfully stole source code for the company’s Galaxy smartphones. This type of attack isn’t something we hear about daily, so it’s an important red flag in cybersecurity news. The hacker group responsible, known as Lapsus$, allegedly uploaded the stolen files—a 190GB file—to Telegram. The group claims the download features “algorithms for biometric …

Be On Alert From Increased International Cyberattacks

The ongoing conflict—and now war—between Russia and Ukraine is dangerous in many ways, not least of which in terms of cybersecurity vulnerabilities. As the war presses on, you’ll need to be on the lookout for Russian cyberattacks, since the country often exploits cybersecurity as part of its military strategy. As reported by Forbes, these are the top cyberattacks feared to …

You Should Update Google Chrome Immediately

Google is generally good at reminding you to update your browser. If you don’t check on your own, you’ll eventually see a little “update” button in your window’s menu bar. However, don’t wait for Google to recommend this latest update, as it fixes a critical security flaw. Google recently announced a new update for Chrome, version 98.0.4758.102, identifying 11 security …

Be On Alert for Microsoft Office Website Scam

Microsoft has identified a multi-stage phishing attack against a number of users. The company reported that hackers took stolen credentials, and registered devices on the targets’ networks, which were then used to deploy phishing email scams. This latest fishing scheme tries to convince users they need to sign a document with an online DocuSign form. When a user would click …