Stamford, White Plains, Syracuse | Absolute Logic
 

Blog

General Motors Customer Data Leaked By Credential Stuffing Attacks

Do you own a Chevrolet, Buick, GMC, or Cadillac?  If so, be aware that GM recently acknowledged that they fell victim to a credential stuffing attack a little over a month ago. ...

The Latest Windows 11 Update Fixes Dozens Of Issues

Are you a Windows 11 early adopter?  If so, you'll want to grab the latest update KB5014019.  It contains several important bug fixes including fixes for Direct3D app crashing issues, slow file ...

Be Aware That ChromeLoader Malware Is Picking Up Steam

A browser hijacker called "ChromeLoader" has had a large uptick in detections this month, which is raising eyebrows among security professionals. ChromeLoader can modify a victim's web browser settings to show search ...

Do I Really Need to Update Software ASAP?

Introduction When you use the Internet every day, whether for work or personal fun, you get into a personal routine. Just like you get up in the morning, eat ...

 New Phishing Attacks Use HTML Email Attachments

HTML attachments as an attack vector may seem a little old school. However, according to statistics compiled by Kaspersky Lab indicates that in 2022, that form of attack is not just simply ...

Upgrade This WordPress Plugin To Avoid Being Hacked

Do you own and manage a WordPress site either personally or as part of your business?  Do you also use the Tatsu plugin which offers a powerful suite of in-browser editing features ...

Update VMWare Apps Now For Critical Security Vulnerabilities

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an advisory that serves as a stark warning. If you're using VMware products that are impacted by recently disclosed critical security flaws, either ...

The Good and Bad of QR Codes

Introduction Imagine if somebody had told you, even just a few years ago, that you would soon be able to look at most restaurant menus, sign up for product ...

Update Addresses Zero Day Exploit For Some Apple Devices

If you're not familiar with the term, a Zero Day exploit is a security flaw that the software vendor is not aware of and hasn't yet patched. In many (but not all) ...

New Phishing Attack Delivers Three Types Of Malware To Victims

Phishing campaigns get more effective the more closely they can imitate a trusted source.  Recently, security researchers at Fortinet discovered evidence of a phishing campaign that specifically targets Microsoft Windows users and ...

Contact

Absolute LogicAbsolute Logic Logo $$$