Category: Articles

  • Ransomware threats are increasing and targeting more devices

    Ransomware threats are increasing and targeting more devices

    According to a new analysis from email security firms, Ransomware assaults have never been more prevalent.    According to the notice, new ransomware organisations emerge on a regular basis. Moreover, new vulnerabilities being exploited are identified practically daily, however, Microsoft’s products are being targeted the most.   In summary, attackers are currently targeting over 7,000 goods manufactured…

  • Malicious VSCode extensions steal credentials

    Malicious VSCode extensions steal credentials

    Cybercriminals have begun to target Microsoft’s VSCode Marketplace. They posted three malicious Visual Studio extensions that were downloaded 46,600 times by Windows developers. The virus allowed threat actors to steal passwords, and system information, and install a remote shell on the victim’s PC. Check Point analysts found the malicious extensions and reported them to the Microsoft…

  • Hackers utilise Azure Serial Console to get unauthorised access

    Hackers utilise Azure Serial Console to get unauthorised access

    A cybergang is utilising phishing and SIM swapping attacks to compromise Microsoft Azure admin credentials and get access to VMs.   The attackers then utilise the Azure Serial Console to install remote management software and Azure Extensions for covert surveillance.     According to the online security website, the cybergang known as UNC3944 has been active…

  • Gmail: Be careful Google could destroy your account

    Gmail: Be careful Google could destroy your account

    If you do nothing, inactive Gmail accounts will be erased permanently. Following Twitter’s decision to remove dormant accounts, Google has announced that it will do the same for old Gmail accounts. Fortunately, it is now quite evident which accounts will be categorised as inactive and when account removals will commence.   Google noted in its…

  • BlackLotus: Microsoft will repair recent Secure Boot vulnerability

    BlackLotus: Microsoft will repair recent Secure Boot vulnerability

    Microsoft provided a patch earlier this week to remedy a Secure Boot bypass problem utilised by the BlackLotus bootkit. The first vulnerability, CVE-2022-21894, was patched in January. However, the current patch for CVE-2023-24932 addresses another commonly exploited workaround for computers running Windows 10 and 11. Also on Windows Server versions dating back to Windows Server…

  • WordPress Plugin: A Critical Vulnerability Discovered

    WordPress Plugin: A Critical Vulnerability Discovered

    Over one million WordPress websites are now vulnerable to attacks. This aims to give unauthorised access to user accounts with elevated privileges. The flaw is due to a newly identified vulnerability in the Essential Addons for Elementor plugin.   A cyber security website researcher highlighted the new vulnerability (CVE-2023-32243) in an alert released on Thursday.   New…

  • Man in the middle in phishing attacks are increasing  

    Man in the middle in phishing attacks are increasing  

    Man-in-the-middle attacks used in phishing are becoming more and more common.  Because man-in-the-middle assaults in phishing operations are so effective, criminals are increasingly using them.    According to a report from cybersecurity website, hackers are enticing victims to web servers capable of brokering the full authentication process rather than just one phoney login page where they…

  • WordPress plugin vulnerability affected more than 2 million sites

    WordPress plugin vulnerability affected more than 2 million sites

    Following a security issue, users of the Advanced Custom Fields WordPress plugins are being recommended to update to version 6.1.6. The security flaw, known as CVE-2023-30777 is reflected in cross-site scripting (XSS). Moreover, it may be exploited to insert arbitrary executable programmes into otherwise secure web pages. There are more than two million active installs…

  • Gmail is mixing ads with ordinary emails

    Gmail is mixing ads with ordinary emails

    Do you like the ads in your Gmail account? No? Unfortunately, it appears that we will receive much more, which is unfortunate. Several internet screenshots demonstrate how users of Gmail for desktop and mobile are seeing far more advertisements than normal. Gmail has always included ads. However, they are often hidden at the top of…

  • Threats to cloud security are expanding more quickly

    Threats to cloud security are expanding more quickly

    Cloud security dangers are expanding more quickly than ever. As threat actors discover fresh and inventive ways to spread malware using cutting-edge technologies,   More than half (55%) of all HTTP and HTTPS malware downloads originated via cloud apps, according to Netskope’s most recent Cloud & Threat Report: Global Cloud and Web Malware Trends study,…