Just like in our galaxy, the dog-like creatures of Star Wars make great best friends. Some may look like monsters, and some might actually be monsters, but all of them are fond of a gentle pat on the head and a yummy treat. These creatures aren’t exactly pups — some of them don’t even have […]
patches
How cybercrime groups are exploiting the latest Microsoft Exchange flaws

Criminals have been targeting organizations that run Exchange hoping to breach ones that haven’t patched the latest bugs, says ESET.
It’s Open Season for Microsoft Exchange Server Hacks


A patch for the vulnerabilities China exploited has been released. Now, criminal groups are going to reverse engineer it—if they haven’t already.
The Accellion Breach Keeps Getting Worse—and More Expensive


What started as a few vulnerabilities in firewall equipment has snowballed into a global extortion spree.
France Ties Russia’s Sandworm to a Multiyear Hacking Spree


A French security agency warns that the destructively minded group has exploited an IT monitoring tool from Centreon.
Cyberpunk 2077 Maker Was Hit With Ransomware—and Won’t Pay Up


CD Projekt Red’s list of woes gets longer, as hackers claim to have stolen the source code for their most popular games.
Apple Fixes One of the iPhone’s Most Pressing Security Risks


By hardening iMessage in iOS 14, the company has effectively cut off what had been an increasingly popular line of attack.
Flash Is Dead—but Not Gone


Zombie versions of Adobe’s troubled software can still cause problems in systems around the world.
How to limit reservable bandwidth in Windows 10 to increase download speeds

By default, Microsoft reserves the right to limit network bandwidth by as much as 80% to accommodate system activities. You have the power to change this setting, if you need to.
How Law Enforcement Gets Around Your Smartphone’s Encryption


New research has dug into the openings that iOS and Android security provide for anyone with the right tools.