Security News

Microsoft Office files, particularly Excel and Word files, have been targeted by some cybercriminals for a long time. As exposed in new research from Cisco Talos, threat actors might leverage event handling functions in Excel files in order to automatically launch.

Security researchers at Microsoft have discovered a bug in macOS that lets malicious apps bypass Apple's Gatekeeper security software "For initial access by malware and other threats." Gatekeeper has been a part of macOS for a decade and is used to validate that apps are signed and notarized before allowing them to be launched.

As Chief Compliance Officers continue to face challenges in restoring employee misconduct reporting to pre-pandemic levels, there are three strategies they should implement to increase confidence in their processes among employees, according to Gartner. "There are clearly structural challenges that have impaired effective misconduct reporting, ranging from new working models, to higher employee turnover, and increased societal polarization," said Chris Audet, VP, research, in the Gartner Legal, Risk & Compliance practice.

A recent report from the US Government Accountability Office has shown that K-12 educational institutions are reluctant to report cyber incidents as they fear they would be penalized. During the fiscal year of 2022, FSA received 409 incident reports, which was down from 460 of the previous year.

GitHub is offering a scheme for security researchers to privately report vulnerabilities found in public repositories. Being able to privately report code flaws is important to researchers who are often left with choices that can lead to more security problems, GitHub said in a blog post.

Security teams are in charge of their company's most important asset - data. Their mission is to make sure they discover and remediate all of the data-related risks and keep up with the frequent changes that can affect their sensitive data.

TeamViewer has pulled the latest version following user reports that the remote access software was displaying "Connection not established. Authentication Cancelled Error" errors and blocking incoming connections. According to customers, these connection issues affect any device running TeamViewer 15.35.7, regardless of the software and hardware configuration.

SonicWall Capture Labs threat researchers recorded 2.8 billion malware hits, in the first half of 2022. Except for June, the global malware detection has been higher in 2022 when compared to 2021.

You will also receive a complimentary subscription to TechRepublic's News and Special Offers newsletter and the Top Story of the Day newsletter. You may unsubscribe from these newsletters at any time.

The zero-trust network security model has become a pervasive topic for IT professionals. Many organizations have a vision of what they want or need in terms of zero-trust and zero-trust network access, but the completeness of their vision isn't necessarily being translated into the solutions they're able to put in place.