Online scams are at an all-time high and thieves have found a way to leverage legitimate services to gather stolen data from phishing attacks. What’s going on? Threat actors are using Google Forms and Telegram as alternative ways to accumulate stolen data and start using them immediately. Moreover, automated phishing […]
Latest Alerts
Credit: Microsoft Microsoft is making available today, April 22, the first preview releases of a couple of its promised next-generation “perpetual” (non-subscription) Office client products. Microsoft is delivering a first public preview of its Office Long Term Servicing Channel (LTSC) release, the successor to Office 2019, designed for larger businesses […]
Cybersecurity firm Trend Micro revealed that a threat actor is actively exploiting a flaw, tracked as CVE-2020-24557, in its antivirus solutions to gain admin rights on Windows systems. Security solutions one again are used as attack vectors by threat actors, this time cybersecurity company Trend Micro revealed that attackers are actively […]
Industrial automation giant Rockwell Automation has started releasing firmware updates for some of its Stratix switches to address another round of vulnerabilities introduced by the use of Cisco’s IOS XE software. Rockwell Automation regularly releases firmware updates for its Stratix devices to address vulnerabilities introduced by the use of Cisco […]
Adversaries are increasingly abusing Telegram as a “command-and-control” system to distribute malware into organizations that could then be used to capture sensitive information from targeted systems. “Even when Telegram is not installed or being used, the system allows hackers to send malicious commands and operations remotely via the instant messaging […]
Credit: Microsoft In January 2021, Microsoft started testing a brand new Windows 10 feature called News and Interests with Windows Insiders. Usually, that will mean this feature might debut in some future Windows feature update somewhere down the line — maybe 21H1 or 21H2, if past rollout schedules were any […]
Lampposts can provide an assisting turn in helping the re-opening and recovery associated with cities since the COVID-19 pandemic goes away. Image: Smarter Together/Dominik Parzinger For the brand new tech gadgets that may pop into your head whenever thinking of clever metropolitan areas, there is a centuries-old device has the […]
A Linux maintainer pledges to stop taking code submissions from the University of Minnesota after a research team purposely submitted vulnerabilities to show software supply chain weaknesses. The University of Minnesota has suspended a research project after complaints that two student researchers submitted intentionally vulnerable code to the maintainers of […]
Apple’s AirDrop has a couple of potentially annoying privacy weaknesses that Cupertino is so far refusing to address even though a solution has been offered. A bug-hunting team at Technische Universität Darmstadt in Germany reverse engineered AirDrop – iOS and macOS’s ad-hoc over-the-air file-sharing service – and found that senders […]
Facebook on Wednesday said it took steps to dismantle malicious activities perpetrated by two state-sponsored hacking groups operating out of Palestine that abused its platform to distribute malware. The social media giant attributed the attacks to a network connected to the Preventive Security Service (PSS), the security apparatus of the […]