| | | ZDNet | The hackers behind the SolarWinds supply chain attack managed to escalate access inside Microsoft's internal network and gain access to a small number of internal accounts, which they used to access Microsoft source code repositories, the company said on Thursday. Microsoft emphasized that despite viewing some source code, the threat actors did not escalate the attack to reach production systems, customer data, or use Microsoft products. | | BetterCloud | Recent events have drastically changed business operations for every organization. And when times get lean, IT must also. In this ebook, we discuss the four essentials to amp up IT efficiency, how to measure it, and tools to help improve it. | | Neowin | From the first day of the new year, Flash Player will no longer be updated or distributed by Adobe. Even if you manage to find a third-party download for Flash Player, something that you’re not recommended to install, web browsers such as Firefox 85 will not even support the plugin. | | BleepingComputer | A data breach broker is selling the allegedly stolen user records for twenty-six companies on a hacker forum, BleepingComputer has learned. Last Friday, a data broker began selling the combined total of 368.8 million stolen user records for twenty-six companies on a hacker forum. |
|
|
| | How-To Geek | Did you get a shiny new Wi-Fi router to help with all your stay-at-home internet activities? You’re likely not alone, thanks to the rise in video conferencing, streaming, and other internet-related activities across the home. But the worst part is updating all your devices with the new Wi-Fi name and password. That is unless you do the smart thing and reuse your SSID and Password. | | MakeUseOf | We all have particularly important and sensitive files: financial records, old family photos, or a hobby you would like to keep secret even from close friends. But having your files on a laptop or PC is unsafe. Devices could get stolen and a simple mistake while browsing the internet could give a hacker complete access. Your best option to fully secure your files and folders is to encrypt them. |
|
|
|