securitynewspaper.com securitynewspaper.com

Fix these Windows vulnerabilities before someone exploits them

On many occasions, security flaws appear that can compromise our devices. They can affect operating systems like Windows, applications, drivers. It is important to always correct them and prevent hackers from having a choice. In this article we echo the latest and important vulnerabilities that Windows has corrected. We’re going to explain why you should upgrade ASAP. Microsoft fixes numerous bugs Since Microsoft they have released...

securitynewspaper.com securitynewspaper.com

4TB of confidential data, firmware code of Cellebrite TFS and Cellebrite Mobilogy leaked. UFED tool can be used to unlock any iPhone or Android

A threat actor has leaked 4TB of confidential data from Cellebrite an Israeli digital intelligence company. Cellebrite is an Israeli company specialized in providing forensic tools to security forces and companies, such as extracting data from an encrypted iPhone or Android mobile. It offers services to collect, review, analyze, and manage digital data. Its tools are used by law enforcement agencies worldwide.  4TB of proprietary...

securitynewspaper.com securitynewspaper.com

Windows enables default account lockout policy for RDP (Remote Desktop Protocol) to reduce ransomware attacks based on brute forcing RDP

Microsoft has chosen to add specific security measures against brute force attacks against RDP (Remote Desktop Protocol). These security improvements have been introduced in the most recent builds of Windows 11. Given the evolution of this type of attack abusing RDP, Microsoft decided to add the security measure in the latest Insider Preview22528.1000. This system automatically locks accounts for 10 minutes after 10 invalid login...

securitynewspaper.com securitynewspaper.com

What is Zero Trust Security Model?

Zero Trust Security is one of the technology trends with the form of a security architecture model that is starting to be used by many companies to strengthen their infrastructure. In actuality, zero trust can mean many things to many people. At least, according to the report, three principles can be defined as Zero Trust Security. First, Zero Trust Security can be a posture-setting strategy for gaining access to applications and also...