More stories

  • in

    Microsoft: New Exchange Server zero-days already used in attacks, expect more to come

    Close up of hands typing on a keyboard Getty Images/iStockphoto Microsoft has warned that attackers are already taking advantage of recently disclosed zero-day exploits to hack into victim’s networks and steal data – and more attacks are likely to be on the way. The two new zero-day vulnerabilities in Microsoft Exchange Server – CVE-2022-41040 and […] More

  • in

    The best home security systems of 2022

    If you are most concerned about protecting or being able to monitor outdoor spaces, such as your garden, porch, an outside office, or garage doors, the Arlo Pro 4 spotlight camera security bundle is a great option for you. The Arlo Pro 4 spotlight camera security bundle, available at Best Buy, comes with three Pro 4 cameras that can be mounted outdoors or placed indoors, perhaps on your window sill, for example. Each camera offers a 160-degree field of view and records footage in 2K HDR video. You can tap into the cameras, day or night, to zoom in on details, and the inclusion of color night vision makes Arlo’s cameras an excellent option for vulnerable outside spaces. Furthermore, the typical hassle of installing security solutions outside has been wiped out as each weather-resistant camera is wireless and powered by rechargeable batteries — and each comes with an anti-theft mount. The pack also includes batteries, a charging station, screw kits, a security key, and a sign to politely warn would-be intruders that your area is being monitored.  More

  • in

    New Exchange Server zero-day vulnerabilities are being used in cyberattacks: Protect your network now

    Image: Getty Newly discovered zero-days in Microsoft Exchange Server are being used actively in cyberattacks. The two zero-day vulnerabilities affect Microsoft Exchange Server 2013, 2016, and 2019, Microsoft Security Response Center (MSRC) has warned, after the exploits were disclosed by researchers at Vietnamese cybersecurity firm GTSC. One (CVE-2022-41040) is a is a Server-Side Request Forgery […] More

  • in

    Microsoft: Hackers are using open source software and fake jobs in phishing attacks

    Image: Natee Meepian / Shutterstock Microsoft is warning that hackers are using open source software and bogus social media accounts to dupe software engineers and IT support staff with fake job offers that in reality lead to malware attacks. A phishing-happy hacking crew linked to North Korea’s armed forces has been using trojanized open-source apps […] More

  • in

    Want to study for ethical hacking? You can with this $35 certification bundle

    StackCommerce The following content is brought to you by ZDNet partners. If you buy a product featured here, we may earn an affiliate commission or other compensation. Cyber crimes continue to increase in frequency and severity, so the demand for cyber security skills will keep growing. And now, you can study for certified ethical hacking […] More

  • in

    What the Securing Open Source Software Act does and what it misses

    Getty Images/iStockphoto There’s at least one thing Republicans and Democrats can agree on in the US Senate: the importance of open-source software. Seriously.  Open Source As US Senator Gary Peters (D-MI) said last week, “Open-source software is the bedrock of the digital world.” His partner across the aisle, Rob Portman (R-OH), agreed, saying, “The computers, […] More

  • in

    Want to dodge a data breach? Do DevOps and let developers work from home, says Google

    DevOps, which brings faster software updates, could help prevent the avalanche of records exposed in data breaches, but Google’s research finds that existing practices don’t meet the task at hand.    Google surveyed 33,000 tech pros to explore how DevOps — which broadly means aligning software development with IT operations — impacts cybersecurity as part […] More