Why is Email Such a Hot Commodity for Hackers?
January 26, 2023
Email is our most effective productivity tool. That is why phishing poses such a risk to everyone. We’re encouraged to look for warning signs of phishing attempts, but it isn’t easy when they seem just like legitimate emails. Attacks on our inboxes are consistently effective, from the…
0 Comments7 Minutes
Hackers Spreading Malware using Microsoft OneNote Attachments
January 25, 2023
Threat actors are increasingly using OneNote attachments in phishing emails to infect users with remote access malware that can be used to install other software, steal passwords or even cryptocurrency wallets. For years, attackers have distributed malware in emails through malicious Word and…
0 Comments6 Minutes
WhatsApp Fined €5.5 Million for Violating Data Protection Laws
January 24, 2023
On Thursday, the Irish Data Protection Commission (DPC) fined WhatsApp, a Meta company, €5.5 million for breaching data protection rules when processing users’ personal information. The ruling is based on an update to the Terms of Service of the platform that was implemented in the days…
0 Comments5 Minutes
Norton Password Manager Hack Affects Nearly 1 Million Users
January 23, 2023
Norton Password Manager & Norton LifeLock, a company that says it will keep you safe online, found that an unauthorized third party was trying to log into many customer accounts. The company is telling customers to change their passwords or risk having them stolen. On Friday, January 13, 2023,…
0 Comments5 Minutes
The Rise of Quantum Computing and Its Impact on Cybersecurity
January 19, 2023
According to a recent Zapata Computing analysis, organizations’ commitment is growing, indicating a developing market with broad, worldwide interest and greater urgency surrounding post-quantum cyber security concerns. According to the study, the increased interest in quantum translates into…
0 Comments6 Minutes
Industrial Control Systems from Major Manufacturers May Have Flaws, CISA Warns
January 18, 2023
Sewio, InHand Networks, Sauter Controls, and Siemens products are all affected by severe security issues, according to several Industrial Control Systems (ICS) warnings published by the U.S. Cybersecurity and Infrastructure Security Agency (CISA). The most serious vulnerability affects…
0 Comments4 Minutes
What exactly is LockBit ransomware and how does it work?
January 17, 2023
The LockBit ransomware operation has once again dominated headlines, as we learned that they were responsible for the UK’s Royal Mail attack. Royal Letter is the United Kingdom’s leading mail delivery service, and its interruption substantially influences the country’s economy and…
0 Comments2 Minutes
Microsoft Macros Explained: A Blessing and a Curse
January 16, 2023
Macros force people to choose between productivity and security. On the one hand, macros save end users a lot of time by automating repetitive processes. But on the other hand, it is very easy for hackers to implant malware into a macro that may avoid security detection. The answer to this problem…
0 Comments7 Minutes
16 Major Car Brands Vulnerable to CyberAttacks
January 12, 2023
Millions of automobiles from 16 different manufacturers could be exploited. The vulnerabilities allow hackers to monitor, start, and unlock cars and invade car owners’ privacy via security flaws in APIs. The issues were discovered in software from Reviver, SiriusXM, and Spireon, as well as…
0 Comments5 Minutes
How to accelerate your incident response plan in 2023?
January 10, 2023
An incident response plan is critical to an organization’s cyber security posture. It outlines the steps to be taken in the event of a cyber-attack or other security incidents. It helps ensure that an organization is prepared to respond to and recover from such incidents effectively. Here…
0 Comments3 Minutes