


Sneaky Orbit Malware Backdoors Linux Devices
Researchers have discovered a devious malware for Linux: backdooring devices and stealing data. The malware can alter the overall functioning of any device that it gets into. Popularly known as Orbit, the malware works differently from regular Linux threats. The...
The U.S. Health Organizations Targeted With Maui Ransomware
North Korea’s state-sponsored ransomware operators have launched a campaign targeting healthcare organizations in the United States. This is according to an advisory issued by the Federal Bureau of Investigations (FBI) and the Infrastructure Security Agency...
Vulnerabilities Found in Widely Used Robustel Industrial Routers
The Cisco Talos Threat Analytic and Research Unit has picked up several threats and vulnerabilities in the popularly used industrial cellular gateway IoT. The affected device, called the R1510, was created by a Chinese company called Robustel. The product is designed...
CISA Suggests That Organizations Use the Most Recent Version of Google Chrome
Blog CISA Suggests That Organizations Use the Most Recent Version of Google Chrome CISA Suggests That Organizations Use the Most Recent Version of Google Chrome Users and administrators should update to a new version of Chrome released by Google last week to address...
Beware the ‘Secret Agent’ Cloud Middleware
Last Thursday, at RSA Conference in San Francisco, the researchers from Wiz.io unveiled an open-source cloud middleware database on GitHub that details the particular middleware agents that Amazon Web Services (AWS), Google, and Microsoft put on their cloud...
TrustNet Wins “Editor’s Choice in Managed Security Service Provider (MSSP)” at #RSAC 2022
Blog TrustNet Wins “Editor’s Choice in Managed Security Service Provider (MSSP)” at #RSAC 2022 TrustNet Wins “Editor’s Choice in Managed Security Service Provider (MSSP)” at #RSAC 2022 SAN FRANCISCO (BUSINESSWIRE) JUNE 6, 2022 – TrustNet is proud to announce we have...
Biometric Data Provides Increased Security, There Are Risk Factors
As the use of biometric data becomes more widespread, it is important to consider the potential risks associated with its use. While biometric data can provide increased security, there are a number of factors that should be considered when using this type of data....
ChromeLoader Browser Hijacker Provides Gateway to Bigger Threats
Although ChromeLoader may appear to be a run-of-the-mill browser hijacker that merely reroutes users to advertising sites, its use of PowerShell might represent a greater danger by allowing for further and more sophisticated malicious activity such as the spread of...
Follina: A New Microsoft Zero-Day Attack is Now Underway
Worried about fraud, employers are shifting to authentication technologies that are both secure and user-friendly. But there’s a catch. Adversaries are actively exploiting a readily exploitable vulnerability in the Microsoft Support Diagnostic Tool (MSDT) in...
Zyxel Firewall Bug is Active and Being Used After PoC Exploit Demo Debut
Zyxel firewalls are currently (as of May 2022) under a cyberattack after a critical security flaw was disclosed last week, allowing unauthenticated, remote arbitrary code execution. The flaw, CVE-2020-9054, exists in the XML parser of Zyxel’s network-attached...