Skip to main content

Robots typing at computers
Cybersecurity

Zendesk vulnerability could help attackers phish, infiltrate, researchers warn

“They can use it as an additional arsenal in their toolset to land phishing emails to employee mailboxes,” researcher tells IT Brew.


A silver shied surrounded by a bug silhouette, pie chart, and binary code
Cybersecurity

What it takes to be a bug bounty hunter today

“It’s so easy to get burned out and just spend all your time hacking,” one full-time bug bounty hunter tells IT Brew.


Mouse clicker arrows attacking monitors.
Cybersecurity

Security pro demos ‘double’ take on classic clickjacking

The sleight-of-hand tactic “affects almost every website,” according to a recent post from security engineer Paulos Yibelo.


A graphic of a hacked computer mainframe with the words "ransomware" in red and an image of a white-hooded figure.
Cybersecurity

Veeam vulnerability could open door to attacks, groups warn

“Fortunately for IT security admins, all of the Backup & Replication vulnerabilities appear to have been resolved in a single update,” one expert says.


barbed wire around a phone
Cybersecurity

What the ‘Dirty Stream’ vulnerability pattern means for Android users

“As of February 2024, fixes have been deployed for the aforementioned apps, and users are advised to keep their device and installed applications up to date,” Microsoft Threat Intelligence shared in a post.


Friends taking pictures of food on the table with smartphones during brunch in restaurant
Cybersecurity

The first security step when it comes to applications? Find them all

Inventory tools can help, as long as you know what to look for.


Image of Microsoft's logo
Cybersecurity

After some block and forth, Microsoft stops Office macros by default

Some attackers have used macros to corrupt Office files with ransomware.

Top insights for IT pros

From cybersecurity and big data to cloud computing, IT Brew covers the latest trends shaping business tech in our 4x weekly newsletter, virtual events with industry experts, and digital guides.

By subscribing, you accept our Terms & Privacy Policy.

A mobile phone scrolling a newsletter issue of IT Brew