Security News
![Hackers Can Bypass Windows Lockscreen on Remote Desktop Sessions](/static/build/img/news/alt/cyberattack-statistics-1-small.jpg)
The Network Level Authentication (NLA) feature of Windows Remote Desktop Services (RDS) can allow a hacker to bypass the lockscreen on remote sessions, and there is no patch from Microsoft, the...
![macOS 0-Day Flaw Lets Hackers Bypass Security Features With Synthetic Clicks](/static/build/img/news/alt/cybersecurity-attacker-small.jpg)
A security researcher who last year bypassed Apple's then-newly introduced macOS privacy feature has once again found a new way to bypass security warnings by performing 'Synthetic Clicks' on...
![Legacy app whitelist can be abused to bypass latest macOS security features, expert warns](/static/build/img/news/alt/cybercrime-statistics-small.jpg)
Three words to ruin an Apple engineer's day: 'Patrick Wardle disclosure' Malware can bypass protections in macOS Mojave, and potentially access user data as well as the webcam and mic – by...
![Hackers Can Bypass macOS Security Features With Synthetic Clicks](/static/build/img/news/alt/data-breach-stats-small.jpg)
Hackers can use synthetic clicks to bypass many of the privacy and security features implemented last year by Apple in its macOS operating system, a researcher has revealed. read more
![macOS Gatekeeper Bypass Exploits Trust on Network Shares](/static/build/img/news/alt/cyberattack-statistics-1-small.jpg)
Bypassing macOS’ Gatekeeper by leveraging trust in network shares is a trivial operation, a security researcher has discovered. read more
![Authentication Bypass Bug Hits Top Enterprise VPNs](/static/build/img/news/alt/hackers-statistics-small.jpg)
Business users of Cisco, F5 Networks, Palo Alto Networks and Pulse Secure platforms are impacted, according the U.S. government.
![A quarter of phishing emails bypass Office 365 security](/static/build/img/news/alt/Phishing-small.jpg)
Email phishing is one of the most often used – and most successfully used – attack vectors that lead to cybersecurity incidents and breaches. Microsoft is the most impersonated brand “Cloud based...
![Week in review: Norsk Hydro cyber attack, Android privacy, exploiting IMAP to bypass MFA](/static/build/img/news/alt/Data-Cybersecurity-Predictions-2-small.jpg)
Here’s an overview of some of last week’s most interesting news and articles: Norsk Hydro cyber attack: What happened? “Hydro subject to cyber-attack,” warned Oslo-headquartered Norsk Hydro ASA,...
![Latest tactics used by cybercriminals to bypass traditional email security](/static/build/img/news/alt/cybersecurity-breach-statistics-small.jpg)
Cybercriminals are continuously using new strategies to get past email security gateways, with brand impersonation being used in 83 percent of spear-phishing attacks, while 1 in 3 business email...
![Authentication Bypass Vulnerability Found in SoftNAS Cloud](/static/build/img/news/alt/cloud-cybersecurity-statistics-small.jpg)
A security firm's Vulnerability Research Team (VRT) found and reported a vulnerability in SoftNAS Cloud data storage. SoftNAS fixed the vulnerability last week, and details of the vulnerability...