Skip to navigation Skip to content
Internet Explorer zero day among 99 Patch Tuesday problems

DigTec

Digital Technology Unlocked

  • About DigTec
    • Blog
    • Contact Us
  • Information Security
    • Cloud Security
    • Cyber Security
    • Cyberwarfare
  • Threats
    • All
      Cyber Attacks
      Cyber Crime
      Data Breach
      Fraud
      Malware
      Ransomware
      Redcar & Cleveland Council confirms ransomware attack

      Redcar & Cleveland Council confirms ransomware att...

      More than 15.1 Billion Records Exposed in 2019

      More than 15.1 Billion Records Exposed in 2019

      FBI: Kwampirs Malware Targeting Supply Chain Software Providers

      FBI: Kwampirs Malware Targeting Supply Chain Software P...

      Beware this sneaky Android malware that reinstalls itself after a factory reset

      Beware this sneaky Android malware that reinstalls itse...

      Purdue University Team Creates a Detection System to Alert Organizations to Cyberattacks

      Purdue University Team Creates a Detection System to Al...

      Redcar cyber-attack: Council using pen and paper

      Redcar cyber-attack: Council using pen and paper

      Toll Group Shuts Down IT Systems Due to Cyberattack

      Toll Group Shuts Down IT Systems Due to Cyberattack

      FBI: DDoS Attack Potentially Targeted State Voter Registration Site

      FBI: DDoS Attack Potentially Targeted State Voter Regis...

      Redcar cyber-attack: Council using pen and paper

      Redcar cyber-attack: Council using pen and paper

      Cybercrime Breaches Cost Corporate Boards Big Time: Have You Done Your Due Diligence?

      Cybercrime Breaches Cost Corporate Boards Big Time: Hav...

      Web app ubiquity gives cyber criminals new opportunities

      Web app ubiquity gives cyber criminals new opportunitie...

      An extra letter “s” enabled a million-dollar real estate scam

      An extra letter “s” enabled a million-dollar real estat...

      More than 15.1 Billion Records Exposed in 2019

      More than 15.1 Billion Records Exposed in 2019

      40 Million Americans Affected by Health Data Breaches in 2019

      40 Million Americans Affected by Health Data Breaches i...

      Breach at Indian Airline Affects 1.2 Million Passengers

      Breach at Indian Airline Affects 1.2 Million Passengers

      Microsoft data breach exposes 250 million customer service and support records

      Microsoft data breach exposes 250 million customer serv...

      Phishing Scheme Uses Google Drive to Avoid Security: Report

      Phishing Scheme Uses Google Drive to Avoid Security: Re...

      European Central Bank Closes a Website Following Hack

      European Central Bank Closes a Website Following Hack

      Exclusive: Hack Breaks Your Visa Card’s Contactless Limit For Big Frauds

      Exclusive: Hack Breaks Your Visa Card’s Contactless Lim...

      Man stole $122m from Facebook and Google by sending them random bills, which the companies dutifully paid

      Man stole $122m from Facebook and Google by sending the...

      FBI: Kwampirs Malware Targeting Supply Chain Software Providers

      FBI: Kwampirs Malware Targeting Supply Chain Software P...

      Beware this sneaky Android malware that reinstalls itself after a factory reset

      Beware this sneaky Android malware that reinstalls itse...

      Sodinokibi ransomware ID’d as cause of Travelex business disruptions

      Sodinokibi ransomware ID’d as cause of Travelex busines...

      Dexphot malware uses fileless techniques to install cryptominer

      Dexphot malware uses fileless techniques to install cry...

      Redcar & Cleveland Council confirms ransomware attack

      Redcar & Cleveland Council confirms ransomware att...

      RobbinHood ransomware tricks Windows into deleting defences

      RobbinHood ransomware tricks Windows into deleting defe...

      Sodinokibi ransomware ID’d as cause of Travelex business disruptions

      Sodinokibi ransomware ID’d as cause of Travelex busines...

      A Look Inside the Highly Profitable Sodinokibi Ransomware Business

      A Look Inside the Highly Profitable Sodinokibi Ransomwa...

  • Cyber Self-Defense
  • Digital Forensics
    • The Right Path For A First Time Linux User

      The Right Path For A First Time Linux User

      Hot Jobs for 2020

      Hot Jobs For 2020 and Beyond

      Federal Rules of Civil Procedure and ESI – The 2006 FRCP Amendments

      Federal Rules of Civil Procedure and ESI – The 20...

      National Skills Shortage in Computer Forensics

      National Skills Shortage in Computer Forensics

      The Evolution of E-Discovery and Computer Forensics, Part 2: Zubulake V. UBS Warburg

      The Evolution of E-Discovery and Computer Forensics, Pa...

  • Digital Marketing
    • All
      Blogging
      Content Marketing
      Lead Generation
      Search Engine Marketing
      SEO
      Social Media Marketing
      7 Emerging Technologies in SEO and Their Applications

      7 Emerging Technologies in SEO and Their Applications

      2021 Local SEO Success: Expert Tips & Predictions

      2021 Local SEO Success: Expert Tips & Predictions

      How to Run a Remote Startup: Hiring, Managing & Scaling

      How to Run a Remote Startup: Hiring, Managing & Sc...

      There’s Gold In Them Thar SERPs: Mining Important SEO Insights from Search Results

      There’s Gold In Them Thar SERPs: Mining Important...

      Which Platform Is Better for Your Business – WordPress or SquareSpace?

      Which Platform Is Better for Your Business – Word...

      Advanced Blogging With WordPress

      Advanced Blogging With WordPress

      Optimizing WordPress for RSS

      Optimizing WordPress for RSS

      Top 7 Tips To Access The World of WordPress Store Owners

      Top 7 Tips To Access The World of WordPress Store Owner...

      5 Ways a Content Marketing Mission Statement Can Improve Your Strategy

      5 Ways a Content Marketing Mission Statement Can Improv...

      4 Steps to Better Lead Generation Strategy | Digital Maturity

      4 Steps to Better Lead Generation Strategy | Digital Ma...

      The Power of “Is”: A Featured Snippet Case Study

      The Power of “Is”: A Featured Snippet Case ...

      3 Major Differences Between Google Ads and Microsoft Advertising

      3 Major Differences Between Google Ads and Microsoft Ad...

      How to Get Your Web Developer on Board with SEO [Bonus PDF] – Whiteboard Friday

      How to Get Your Web Developer on Board with SEO

      Topical and Tangential Content | How to Boost Your Organic Traffic

      Topical and Tangential Content | How to Boost Your Orga...

      The Rules of Link Building – Best of Whiteboard Friday

      The Rules of Link Building

      SEO for 2020 – Whiteboard Friday

      SEO for 2020

      How to Boost Engagement with User-Generated Content on Instagram

      How to Boost Engagement with User-Generated Content on ...

      7 Fundamental Facebook Advertising Tips for Small Business Marketers

      7 Fundamental Facebook Advertising Tips for Small Busin...

      Boost Your Facebook Video Views with These 6 Tactics

      Boost Your Facebook Video Views with These 6 Tactics

Internet Explorer zero day among 99 Patch Tuesday problems
DigTec

DigTec

Digital Technology Unlocked

  • About DigTec
    • Blog
    • Contact Us
  • Information Security
    • Cloud Security
    • Cyber Security
    • Cyberwarfare
  • Threats
    • All
      Cyber Attacks
      Cyber Crime
      Data Breach
      Fraud
      Malware
      Ransomware
      Redcar & Cleveland Council confirms ransomware attack

      Redcar & Cleveland Council confirms ransomware att...

      More than 15.1 Billion Records Exposed in 2019

      More than 15.1 Billion Records Exposed in 2019

      FBI: Kwampirs Malware Targeting Supply Chain Software Providers

      FBI: Kwampirs Malware Targeting Supply Chain Software P...

      Beware this sneaky Android malware that reinstalls itself after a factory reset

      Beware this sneaky Android malware that reinstalls itse...

      Purdue University Team Creates a Detection System to Alert Organizations to Cyberattacks

      Purdue University Team Creates a Detection System to Al...

      Redcar cyber-attack: Council using pen and paper

      Redcar cyber-attack: Council using pen and paper

      Toll Group Shuts Down IT Systems Due to Cyberattack

      Toll Group Shuts Down IT Systems Due to Cyberattack

      FBI: DDoS Attack Potentially Targeted State Voter Registration Site

      FBI: DDoS Attack Potentially Targeted State Voter Regis...

      Redcar cyber-attack: Council using pen and paper

      Redcar cyber-attack: Council using pen and paper

      Cybercrime Breaches Cost Corporate Boards Big Time: Have You Done Your Due Diligence?

      Cybercrime Breaches Cost Corporate Boards Big Time: Hav...

      Web app ubiquity gives cyber criminals new opportunities

      Web app ubiquity gives cyber criminals new opportunitie...

      An extra letter “s” enabled a million-dollar real estate scam

      An extra letter “s” enabled a million-dollar real estat...

      More than 15.1 Billion Records Exposed in 2019

      More than 15.1 Billion Records Exposed in 2019

      40 Million Americans Affected by Health Data Breaches in 2019

      40 Million Americans Affected by Health Data Breaches i...

      Breach at Indian Airline Affects 1.2 Million Passengers

      Breach at Indian Airline Affects 1.2 Million Passengers

      Microsoft data breach exposes 250 million customer service and support records

      Microsoft data breach exposes 250 million customer serv...

      Phishing Scheme Uses Google Drive to Avoid Security: Report

      Phishing Scheme Uses Google Drive to Avoid Security: Re...

      European Central Bank Closes a Website Following Hack

      European Central Bank Closes a Website Following Hack

      Exclusive: Hack Breaks Your Visa Card’s Contactless Limit For Big Frauds

      Exclusive: Hack Breaks Your Visa Card’s Contactless Lim...

      Man stole $122m from Facebook and Google by sending them random bills, which the companies dutifully paid

      Man stole $122m from Facebook and Google by sending the...

      FBI: Kwampirs Malware Targeting Supply Chain Software Providers

      FBI: Kwampirs Malware Targeting Supply Chain Software P...

      Beware this sneaky Android malware that reinstalls itself after a factory reset

      Beware this sneaky Android malware that reinstalls itse...

      Sodinokibi ransomware ID’d as cause of Travelex business disruptions

      Sodinokibi ransomware ID’d as cause of Travelex busines...

      Dexphot malware uses fileless techniques to install cryptominer

      Dexphot malware uses fileless techniques to install cry...

      Redcar & Cleveland Council confirms ransomware attack

      Redcar & Cleveland Council confirms ransomware att...

      RobbinHood ransomware tricks Windows into deleting defences

      RobbinHood ransomware tricks Windows into deleting defe...

      Sodinokibi ransomware ID’d as cause of Travelex business disruptions

      Sodinokibi ransomware ID’d as cause of Travelex busines...

      A Look Inside the Highly Profitable Sodinokibi Ransomware Business

      A Look Inside the Highly Profitable Sodinokibi Ransomwa...

  • Cyber Self-Defense
  • Digital Forensics
    • The Right Path For A First Time Linux User

      The Right Path For A First Time Linux User

      Hot Jobs for 2020

      Hot Jobs For 2020 and Beyond

      Federal Rules of Civil Procedure and ESI – The 2006 FRCP Amendments

      Federal Rules of Civil Procedure and ESI – The 20...

      National Skills Shortage in Computer Forensics

      National Skills Shortage in Computer Forensics

      The Evolution of E-Discovery and Computer Forensics, Part 2: Zubulake V. UBS Warburg

      The Evolution of E-Discovery and Computer Forensics, Pa...

  • Digital Marketing
    • All
      Blogging
      Content Marketing
      Lead Generation
      Search Engine Marketing
      SEO
      Social Media Marketing
      7 Emerging Technologies in SEO and Their Applications

      7 Emerging Technologies in SEO and Their Applications

      2021 Local SEO Success: Expert Tips & Predictions

      2021 Local SEO Success: Expert Tips & Predictions

      How to Run a Remote Startup: Hiring, Managing & Scaling

      How to Run a Remote Startup: Hiring, Managing & Sc...

      There’s Gold In Them Thar SERPs: Mining Important SEO Insights from Search Results

      There’s Gold In Them Thar SERPs: Mining Important...

      Which Platform Is Better for Your Business – WordPress or SquareSpace?

      Which Platform Is Better for Your Business – Word...

      Advanced Blogging With WordPress

      Advanced Blogging With WordPress

      Optimizing WordPress for RSS

      Optimizing WordPress for RSS

      Top 7 Tips To Access The World of WordPress Store Owners

      Top 7 Tips To Access The World of WordPress Store Owner...

      5 Ways a Content Marketing Mission Statement Can Improve Your Strategy

      5 Ways a Content Marketing Mission Statement Can Improv...

      4 Steps to Better Lead Generation Strategy | Digital Maturity

      4 Steps to Better Lead Generation Strategy | Digital Ma...

      The Power of “Is”: A Featured Snippet Case Study

      The Power of “Is”: A Featured Snippet Case ...

      3 Major Differences Between Google Ads and Microsoft Advertising

      3 Major Differences Between Google Ads and Microsoft Ad...

      How to Get Your Web Developer on Board with SEO [Bonus PDF] – Whiteboard Friday

      How to Get Your Web Developer on Board with SEO

      Topical and Tangential Content | How to Boost Your Organic Traffic

      Topical and Tangential Content | How to Boost Your Orga...

      The Rules of Link Building – Best of Whiteboard Friday

      The Rules of Link Building

      SEO for 2020 – Whiteboard Friday

      SEO for 2020

      How to Boost Engagement with User-Generated Content on Instagram

      How to Boost Engagement with User-Generated Content on ...

      7 Fundamental Facebook Advertising Tips for Small Business Marketers

      7 Fundamental Facebook Advertising Tips for Small Busin...

      Boost Your Facebook Video Views with These 6 Tactics

      Boost Your Facebook Video Views with These 6 Tactics

Trending
  • TietoEVRY hit by ransomware group February 26, 2021
  • 10K Microsoft users targeted by FedEx and DHL phishing attack February 25, 2021
  • CISA and AVANGRID conduct virtual exercise to improve emergency response and rec... February 25, 2021
  • Organizations are at growing risk from Initial Access Brokers February 24, 2021
  • Clubhouse suffers data breach February 24, 2021
  • Reddit appoints Allison Miller as CISO and VP of Trust February 23, 2021
  • Sequoia Capital is hacked due to phishing scam February 23, 2021
  • How insight-driven security builds business resiliency February 22, 2021
  • How do cybercriminals steal credit card information? February 22, 2021
  • Risk and compliance: A 2021 comeback strategy February 22, 2021

Vulnerabilities

  • Home
  • Digital Technology Blog
  • Vulnerabilities
Cloud SecurityTech NewsVulnerabilities

Internet Explorer zero day among 99 Patch Tuesday problems

February 21, 2020422
Internet Explorer zero day among 99 Patch Tuesday problems

Microsoft has released 99 security fixes, 12 flagged as critical, in its February Patch Tuesday update, among them a critical vulnerability in the Int

Read More
Cyber SecurityTech NewsVulnerabilities

Bad Actors can Exploit a Vulnerability to Hack Android Devices through Bluetooth

February 15, 2020390
Bad Actors can Exploit a Vulnerability to Hack Android Devices through Bluetooth

It has always been advised to disable the Bluetooth connection of phone when it is not in use. Recently, security researchers discovered a bug in the

Read More
SecurityTech NewsVulnerabilities

Microsoft Addresses Active Attacks, Air-Gap Danger with 99 Patches

February 14, 2020437
Microsoft Addresses Active Attacks, Air-Gap Danger with 99 Patches

There are 12 critical and five previously disclosed bugs in the February 2020 Patch Tuesday Update. Microsoft has issued one of its largest Patch Tues

Read More
GoogleMobile SecurityTech NewsVulnerabilities

Google patches Bluetooth vulnerability impacting most Android devices

February 14, 2020414
Google patches Bluetooth vulnerability impacting most Android devices

Google has issued a critical security update for Android that affects the Bluetooth functionality on about two-thirds of all Android devices now in us

Read More
Tech NewsVulnerabilities

NSA and Github ‘rickrolled’ using Windows CryptoAPI bug

January 22, 2020513
NSA and Github ‘rickrolled’ using Windows CryptoAPI bug

On Monday this week, the big cybersecurity news was speculative. Was there a big, bad security bug in Microsoft Windows waiting to be announced the ne

Read More
Social MediaTech NewsVulnerabilities

Long-known Vulnerabilities in High-Profile Android Applications

November 26, 2019530
Long-known Vulnerabilities in High-Profile Android Applications

Introduction Most mobile users understandably worry about known vulnerabilities in the core operating system of their devices, which can give an attac

Read More
MalwarePrivacyTech NewsVulnerabilities

Raccoon Stealer Malware Scurries Past Microsoft Messaging Gateways

November 26, 20191071
Raccoon Stealer Malware Scurries Past Microsoft Messaging Gateways

Financial institutions are in the crosshairs of hackers leveraging the malware to steal sensitive data. Criminals behind malware dubbed Raccoon Steale

Read More
AndroidMalwareMobileTech NewsVulnerabilities

Android Camera App Bug Lets Apps Record Video Without Permission

November 24, 2019468
Android Camera App Bug Lets Apps Record Video Without Permission

A new vulnerability has been found in the Camera apps for millions, if not hundreds of millions, of Android devices that could allow other apps to rec

Read More
Tech NewsVulnerabilitiesWordPress

WordPress sites under attack as hacker group tries to create rogue admin accounts

September 2, 2019630
WordPress sites under attack as hacker group tries to create rogue admin accounts

Hackers exploit vulnerabilities in more than ten WordPress plugins to plant backdoor accounts on unpatched sites. A hacker group is exploiting vulnera

Read More
MalwareTech NewsTrojanVulnerabilities

New Trickbot Trojan variant targets mobile users’ PIN codes

September 1, 2019626
New Trickbot Trojan variant targets mobile users’ PIN codes

Researchers uncovered a new version of the Trickbot trojan that steals PIN codes from Verizon Wireless, T-Mobile, and Sprint users. New dynamic webinj

Read More

Posts navigation

1 2 3 Next

Subscribe to all Digital Updates

Featured Products

ULTIMATE WordPress Themes PACK

ULTIMATE WordPress Plugins PACK

Latest Stories

  • TietoEVRY hit by ransomware group February 26, 2021
  • 10K Microsoft users targeted by FedEx and DHL phishing attack February 25, 2021
  • CISA and AVANGRID conduct virtual exercise to improve emergency response and recovery plans February 25, 2021
  • Organizations are at growing risk from Initial Access Brokers February 24, 2021
  • Clubhouse suffers data breach February 24, 2021
  • Reddit appoints Allison Miller as CISO and VP of Trust February 23, 2021
  • Sequoia Capital is hacked due to phishing scam February 23, 2021
  • How insight-driven security builds business resiliency February 22, 2021
  • How do cybercriminals steal credit card information? February 22, 2021
  • 7 Emerging Technologies in SEO and Their Applications February 22, 2021

Categories

Archives

Blogs

  • Tech News
  • Digital Forensics
  • Cloud Security Blog
  • Cyber Security Blog
  • Digital Marketing Blog
  • Technical Terms
  • Technology Blog
  • Important links

Recent Stories

TietoEVRY hit by ransomware group
TietoEVRY hit by ransomware group
February 26, 2021
10K Microsoft users targeted by FedEx and DHL phishing attack
10K Microsoft users targeted by FedEx and DHL phishing attack
February 25, 2021
CISA and AVANGRID conduct virtual exercise to improve emergency response and recovery plans
CISA and AVANGRID conduct virtual exercise to improve emergency response and recovery plans
February 25, 2021

Connect with us

Facebook
Internet Explorer zero day among 99 Patch Tuesday problems
DigTec (Digital Technology Unlocked) is dedicated to provide knowledge and insight into the Information Security Industry by sharing relevant stories from all around the web that matter to IT professionals and decision-makers.
© Copyright 2019-2020. All Rights reserved.
  • Privacy Policy
  • Terms of Use
  • Sitemap
  • Contact Us
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled

Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.

Non-necessary

Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.

SAVE & ACCEPT
  • Share
  • Share
  • Share
  • Share
  • Mail
  • Share
  • Spread the love!