Posts

Showing posts from January, 2022

This Phishing Attack Meddles With Your Emails – Alerts Microsoft

Apple Patched Two Zero-Day Bugs And Other Flaws With iOS 15.3, Safari 15.3

New LockBit Ransomware Variant Evolves To Target Linux Systems

PwnKit Linux Vulnerability Discovered And Fixed After 12 Years

How to Make Your Smartphone Secure with These 7 Apps

5 Reasons Why Email Is the Top Attack Vector

Vital Ways To Secure A Startup In 2022

Red Cross Data Breach Update: Hackers Directly Targeted ICRC’s Servers

New BRATA Android Trojan Variants Exhibit More Sneaky Functionalities

7 Ways to Protect Your Business From Phishing Scams

Numerous ‘Anomalous’ Spyware Campaigns Actively Target Industrial Systems

GitHub Introduces 2FA On Its Mobile Apps

Microsoft Restricts Excel 4.0 Macros By Default To Contain Malware Attacks Via Malicious Documents

ProtonMail Launches Email Tracking Protection For Web-Based Systems

Users might have no idea their accounts are in danger

Researchers Demonstrate VirusTotal Hacking Attack To Steal Credentials

European Commission Announces Bug Bounty Program For Opensource Software

Researchers Find New BHUNT Cryptostealer Malware Active In The Wild

MFA Bypass Vulnerability Found In Box CMS And File Sharing Software

Red Cross Cyber Attack Resulted In Data Breach Affecting 515K People

This Linux Kernel Bug Affects Numerous Distros – Patch Now!

Safari 15 Browser Vulnerability Potentially Exposes User Data – Apple Yet to Fix

Cybercrime as-a-Service Gets Smarter in 2022

Microsoft Defender Glitch Allowed Hackers to Evade AV Detection

Internet Faxing: 6 Ways To Make Sure Files Are Safe And Secure 

SnatchCrypto Campaign Installs Backdoors In Cryptocurrency Startups

3 Smartphone Safety Tips to Keep Your Online Data Secure

Researcher Discloses Unpatched Vulnerabilities In NUUO NVRmini2 Devices

SysJoker Backdoor Arrives As A Potent Multi-Platform Espionage Threat

Apple macOS Security Bypass Bug Could Allow Access To Private Data

Microsoft January Patch Tuesday Addresses 96 Vulnerabilities

NoReboot iOS Attack Prevents Your iPhone From Turning Off Or Reboot

Safeguarding Your Remote Business From Suspicious Activity? 6 Ways to Keep Your Virtual Office Secure

Top-10 Privacy Fines by UK’s Information Commissioner’s Office

Is Cloud-Based Ransomware the Future of Cyber Crime?

Is Bluetooth a Cyber Security Liability?

New Phishing Campaign Exploits Google Docs Comment Feature

Custom Software Teams Implementing Latest Practices To Secure Pipelines

Cookie Files: Associated Privacy and Security Risk Overview

Researchers Explain How SSRF Vulnerabilities Risk Java RMI Services

Multiple Vulnerabilities Spotted In MSI Digital Assets

Hackers Exploit Cloud Video Platform To Target Real Estate Websites

Beware Of Nasty Telegram Installers That Spread Purple Fox Malware

UScellular Discloses Data Breach Following A Cyber Attack

Zloader Malware Exploits Microsoft Sign Verification To Drop Payload

Researcher Found ‘doorLock’ DoS Bug In Apple HomeKit

The Battle to Keep PvP Games Fair and Out of the Hands of Hackers

Reserve Bank warns Aussies over punting on ‘fad driven’ cryptocurrencies.

Understanding Custom Software

8 Cybersecurity Trends You Must Watch Out For in 2022

Serious Vulnerability Allows Phishing Emails to Be Sent From Uber.com Domain

5 Signs It’s Time to Upgrade Your Office Security

What are online Internet threats

Vulnerabilities In ENC DataVault Software Impact Multiple Storage Devices

New iLOBleed Rootkit Targets HP Integrated Lights-Out