July 14, 2021

Uptycs threat research team analyzed macOS malware threat landscape and discovered that Shlayer and Bundlore are the most predominant malware. The Uptycs threat research team has been observing over 90% of macOS malware in our daily analysis and customer telemetry alerts using shell scripts. Though these scripts have slight variations, they mostly belong to a […]

The post macOS: Bashed Apples of Shlayer and Bundlore appeared first on Security Affairs.

Read More macOS: Bashed Apples of Shlayer and Bundlore

StrikeReady launched StrikeReady Recon, a combination of internal and external intelligence that provides a cross-section of the most active and in-the-wild campaigns, intrusions, and attacks targeting organizations globally, assisting them in protecti…

Read More StrikeReady Recon assists organizations in protecting their mission-critical infrastructure and systems

At the recent ITWC Digital Transformation Conference, Chris Mullens, Executive Director of the Workforce Institute, UKG, shared his thoughts on how AI and analytics are enabling organizations to pivot quickly, keep people safe and connected, and provide management with instant access to trends. Technology writer Steve Prentice was on hand and shared his thought on […]

The post Leveraging technology to build trust first appeared on IT World Canada.

Read More Leveraging technology to build trust

At the recent ITWC Digital Transformation Conference, Dr. Ketaki Desai, Vice President, Business Development, with the Ontario Centre of Innovation (OCI) moderated a panel of quantum computing experts exploring how businesses should be preparing for the impact of quantum computing. Technology writer Steve Prentice was on hand and shared his thought on what he heard.  […]

The post Quantum computing: A new generation of compute power first appeared on IT World Canada.

Read More Quantum computing: A new generation of compute power

The Car Connectivity Consortium (CCC) announced that its CCC Digital Key Release 3.0 specification is finalized and now available to CCC members. The new specification enables passive keyless access and engine start from a compatible mobile device via …

Read More CCC Digital Key 3.0 enables drivers and passengers to use their mobile device as a digital key hands-free

Google security experts revealed that Russia-linked APT group targeted LinkedIn users with Safari zero-day. Security researchers from Google Threat Analysis Group (TAG) and Google Project Zero revealed that four zero-day vulnerabilities have been exploited in the wild earlier this year. The four security flaws were discovered earlier this year and affect Google Chrome, Internet Explorer, and WebKit browser […]

The post Google: four zero-day flaws have been exploited in the wild appeared first on Security Affairs.

Read More Google: four zero-day flaws have been exploited in the wild

SonicWall has issued an urgent warning of an “imminent” ransomware to users of its Secure Mobile Access (SMA) and Secure Remote Access (SRA) products. “Through the course of collaboration with trusted third parties, SonicWall has been made aware of threat actors actively targeting Secure Mobile Access (SMA) 100 series and Secure Remote Access (SRA) products […]

The post Breaking news: SonicWall warns of ‘imminent’ ransomware campaign against certain devices first appeared on IT World Canada.

Read More Breaking news: SonicWall warns of ‘imminent’ ransomware campaign against certain devices

The pandemic has been all about pivoting in the face of unprecedented challenges, and the winners of IT World Canada’s Digital Transformation Awards prove just how well it can be done.  While one of this year’s winners helped save the school year for millions of students, two other 2021 award recipients have literally helped save […]

The post Innovation leaders lauded at Digital Transformation Awards first appeared on IT World Canada.

Read More Innovation leaders lauded at Digital Transformation Awards

LuminousMoth: Kaspersky uncovered an ongoing and large-scale APT campaign that targeted government entities in Southeast Asia, including Myanmar and the Philippines. Kaspersky experts uncovered an ongoing and large-scale cyber espionage campaign, tracked as LuminousMoth, aimed at government entities from Southeast Asia, including Myanmar and the Philippines government entities. The LuminousMoth campaign has been linked by […]

The post China-linked LuminousMoth APT targets entities from Southeast Asia appeared first on Security Affairs.

Read More China-linked LuminousMoth APT targets entities from Southeast Asia

This is a current list of where and when I am scheduled to speak:

Read More Upcoming Speaking Engagements

Microsoft threat analysts are tracking a continued increase in consent phishing emails, also called illicit consent grants, that abuse OAuth request links in an attempt to trick recipients into granting attacker-owned apps permissions to access sensitive data.

The post Microsoft delivers comprehensive solution to battle rise in consent phishing emails appeared first on Microsoft Security Blog.

Read More Microsoft delivers comprehensive solution to battle rise in consent phishing emails

Canadian government is calling for applications from not-for-profit organizations that can support small businesses in the development and implementation of their e-commerce strategies.

The post Government of Canada invites applications for stream 1 of the Canada Digital Adoption Program first appeared on IT World Canada.

Read More Government of Canada invites applications for stream 1 of the Canada Digital Adoption Program

Our world is changing, and Microsoft Security is rising to the challenges of a new normal. Today, I want to share more about how we are empowering our partners to be successful in building trust with customers and enabling business growth.

The post How Microsoft Security empowers partners to build customer trust appeared first on Microsoft Security Blog.

Read More How Microsoft Security empowers partners to build customer trust

Trickbot botnet is back, its authors implemented updates for the VNC module used for remote control of infected systems. The Trickbot botnet continues to evolve despite the operations conducted by law enforcement aimed at dismantling it. The authors recently implemented an update for the VNC module used for remote control over infected systems. In October, Microsoft’s […]

The post Trickbot improve its VNC module in recent attacks appeared first on Security Affairs.

Read More Trickbot improve its VNC module in recent attacks

Trickbot botnet is back, its authors implemented updates for the VNC module used for remote control of infected systems. The Trickbot botnet continues to evolve despite the operations conducted by law enforcement aimed at dismantling it. The authors recently implemented an update for the VNC module used for remote control over infected systems. In October, Microsoft’s […]

The post Trickbot improve its VNC module in recent attacks appeared first on Security Affairs.

Read More Trickbot improve its VNC module in recent attacks

Interpol says ransomware may become a pandemic, expert advice on fighting ransomware and security updates for ForgeRock and Etherpad. Welcome to Cyber Security Today. It’s Wednesday July 14th. I’m Howard Solomon, contributing writer on cybersecurity for ITWorldCanada.com.   Ransomware attacks continue to spread. They’ve gotten so common that the Secretary General of Interpol, the international […]

The post Cyber Security Today, July 14, 2021 – Interpol says ransomware may become a pandemic, expert advice on fighting ransomware and security updates for ForgeRock and Etherpad first appeared on IT World Canada.

Read More Cyber Security Today, July 14, 2021 – Interpol says ransomware may become a pandemic, expert advice on fighting ransomware and security updates for ForgeRock and Etherpad