Massachusetts town loses $445,000 in email scam | StateScoop

According to his statement, town employees in September received legitimate emails from the vendor to discuss issues processing payments. But, unbeknownst to the town, the cybercriminals had compromised some town employee user accounts and were monitoring email correspondence.

Rural hospitals keep getting attacked by cybercriminals. Microsoft and Google are working to fix that | CNN Business

The nation’s roughly 1,800 rural community hospitals are among the most vulnerable to dangerous ransomware attacks because they often lack IT security resources and cybersecurity-trained staff.

8 Best PuTTY Alternatives for SSH Client Connections

PuTTY is just like the translator that bridges the information gap. This software is a handy tool when it comes to establishing an SSH client connection path, which is eventually necessary for file transfers and system management.

Malicious VSCode extensions with millions of installs discovered

Visual Studio Code (VSCode) is a source code editor published by Microsoft and used by many professional software developers worldwide.

Microsoft is reworking Recall after researchers point out its security problems | Ars Technica

Microsoft has announced that it’s making some substantial changes to Recall ahead of its release on the first wave of Copilot+ PCs later this month.

Windows Feature That Records Everything You Do Can Easily Be Hacked

Worse yet, as Wired reports, Microsoft has essentially admitted that it won’t hide passwords or other highly sensitive information — and researchers have already found easy ways to recover this data.

Hackers Exploiting Quick Assist Tool To Deliver Ransomware

Hackers often target remote assist tools because they create a direct channel to access desired systems with minimum effort. 

Crooks plant backdoor in software used by courtrooms around the world | Ars Technica

A software maker serving more than 10,000 courtrooms throughout the world hosted an application update containing a hidden backdoor that maintained persistent communication with a malicious website, researchers reported Thursday, in the latest episode of a supply-chain attack

Teslas Can Still Be Stolen With a Cheap Radio Hack—Despite New Keyless Tech | WIRED

For at least a decade, a car theft trick known as a “relay attack” has been the modern equivalent of hot-wiring: a cheap and relatively easy technique to steal hundreds of models of vehicles.

Rise of zero-day exploits reshape security recommendations | CSO Online

With zero-day attacks rapidly eclipsing exploits of known flaws, CISOs face the specter of having to switch up their security strategies in favor of post-exploitation response.