Cybersecurity NewsMalicious PowerPoint Files Used to Push Remote Access Trojans January 24, 2022 Lale Çorumlu malwarePowerPointcyber securitycyber security newstrojan
Cybersecurity NewsFBI Warns of Malicious QR Codes Used to Steal Your Money January 24, 2022 Lale Çorumlu fbicyber securitycyber security news
Cybersecurity NewsMicrosoft Tests a New "Rejuvenated" Windows 11 Task Manager, How to Enable? January 24, 2022 Lale Çorumlu microsoftRejuvenatedcyber securitycyber security newsWindows 11
Cybersecurity NewsExperts Find Strategic Similarities b/w NotPetya and WhisperGate Attacks on Ukraine January 24, 2022 Lale Çorumlu malwareNotPetyacyber securitycyber security newsWhisperGate
Cybersecurity NewsCISA Adds 17 Vulnerabilities to List of Bugs Exploited in Attacks January 23, 2022 Lale Çorumlu CISAvulnerabilitycyber securitycyber security news
Cybersecurity NewsDutch Cybersecurity Agency Warns of Lingering Log4j Risks January 23, 2022 Lale Çorumlu log4jLog4Shellransomwarecyber securitycyber security news
Cybersecurity NewsWhat Should Employees Pay Attention To When Using Social Media? January 23, 2022 Lale Çorumlu cyber securitycyber security newscyber security tipssocial media
Cybersecurity NewsA Bug in McAfee Agent Allows Running Code with Windows SYSTEM Privileges January 22, 2022 Lale Çorumlu bugMcAfeeMcAfee Agentcyber securitycyber security news
Cybersecurity NewsMicrosoft Disables Excel 4.0 Macros by Default to Block Malware January 22, 2022 Lale Çorumlu excelmalwaremicrosoftcyber securitycyber security news
Cybersecurity NewsOver 90 WordPress Themes, Plugins Backdoored in Supply Chain Attack January 22, 2022 Lale Çorumlu jetpackcyber securitycyber security newssupply chainwordpresswordpress security