Category: Articles

  • Phishing assaults are experiencing a significant increase

    Phishing assaults are experiencing a significant increase

    Researchers report a 5x increase in phishing email attacks year over year. Due to the explosive growth in phishing and other email-borne hacks over the past year, experts have advised small and medium-sized companies to be especially cautious of them. According to a study that examined information from 35 million global participants, since 2022 phishing…

  • The Evolution of IcedID: From Banking Fraud to malware Delivery

    The Evolution of IcedID: From Banking Fraud to malware Delivery

    New versions of IcedID no longer possess the capability for unusual online banking fraud. It concentrates on spreading more malware on compromised systems.   According to the cybersecurity website, since late last year, three different hackers have used these new variants in seven operations. Moreover, all these operations have as their primary objective; the distribution of…

  • Microsoft is stepping up its efforts to prevent hazardous emails

    Microsoft is stepping up its efforts to prevent hazardous emails

    Microsoft is launching a new Exchange Online security feature. Moreover, it is likely that after 90 days of administrators being notified to secure them, any emails sent from “persistently vulnerable exchange servers” will be throttled and eventually stopped. These Exchange servers are found in on-premises or hybrid settings. They are either running out-of-date software or…

  • ChatGPT: Hackers are using to trick people into installing malware

    ChatGPT: Hackers are using to trick people into installing malware

    Campaigns pushing bogus ChatGPT software are duping people all over the world. Cybersecurity website experts have cautioned that hackers are attempting to use the huge popularity of ChatGPT to spread malware.   An intricate plan involving hijacked Facebook profiles, groups, and pages, malicious Facebook advertising, and phony ChatGPT software has been outlined in a report by…

  • Cybersecurity Maturity Report demonstrates organizational unpreparedness for cyberattacks

    Cybersecurity Maturity Report demonstrates organizational unpreparedness for cyberattacks

    The new Cybersecurity Maturity Report reveals cyberattacks surged by 38% in 2022 alone, resulting in significant company loss, including financial and brand damage. Meanwhile, corporate security expenses have grown dramatically as a result of the increasing sophistication of assaults and the proliferation of cybersecurity solutions on the market. How equipped are companies and countries to…

  • Hackers use Google Chrome extensions to access your Gmail

    Hackers use Google Chrome extensions to access your Gmail

     Kimsuky used Google Chrome extensions to steal the target’s Gmail emails. Kimsuky also known as Thallium, Velvet Chollima is a North Korean threat organization. It conducts cyber-espionage against diplomats, journalists, government agencies, university academics, and politicians through spear phishing. Initially targeting South Korean targets, the threat actors gradually expanded their operations to the United States…

  • Google cautions consumers of Android device remote issues

    Google cautions consumers of Android device remote issues

      Google’s security research site warns of a troubling group of vulnerabilities disclosed in Samsung semiconductors powering dozens of Android devices. The vulnerability could be exploited within a short period, according to Google. Google Project Zero in-house security researchers reported 18 zero-day vulnerabilities in Samsung Exynos modems over the last few months. These include four…

  • Google adds another AI dollop to Workspace

    Google adds another AI dollop to Workspace

    A select group of trustworthy testers” will soon have access to ChatGPT-like text creation in Google Workspace.   With companies like OpenAI’s ChatGPT and DALL-E capturing the zeitgeist by storm with human prompt-driven generative AI. It was only a matter of time until Google joined the battle.   In conjunction with Google Cloud, Google launched…

  • Cyber Insurance: Strengthening Cyber Defenses

    Cyber Insurance: Strengthening Cyber Defenses

    Cyber insurance companies are losing money. Their loss ratios – total claims plus the insurer’s expenses divided by total premiums received. These are now routinely around 60%, posing an existential danger to the insurance sector. Moreover, potentially renders cyber risk uninsurable owing to diminishing profitability.   The insurance industry is combating its losses by raising rates.…

  • PoC for a major Microsoft Word RCE problem revealed

    PoC for a major Microsoft Word RCE problem revealed

    Over the weekend, a proof-of-concept for CVE-2023-21716, a severe vulnerability in Microsoft Word that permits remote code execution, was disclosed. The vulnerability was given a severity level of 9.8 out of 10. Microsoft Office 365 parent company addressed it in the February Patch Tuesday security patches, along with a handful of remedies. The low attack complexity, with…