WordPress Websites Hacked

15,000 WordPress Websites Hacked as part of Massive Google SEO Poisoning Scheme

15,000 WordPress Websites Hacked according to Sucuri, the first to notice the attacks. As per the security firm, each hacked website has roughly 20,000 files being utilized as a part of the search engine spam operation. In addition, the majority of the websites are powered by WordPress, as shown…


1 Comment6 Minutes

Canadian Hacker Sentenced to 20 Years in Prison

Canadian Hacker Sentenced to 20 Years in Prison in Connection to NetWalker Ransomware

Canadian Hacker Sentenced to 20 Years in Prison by a U.S. court for his participation in a series of hacks connected to the NetWalker ransomware. Canadian Hacker Sentenced to 20 Years in Prison! Sebastian Vachon-Desjardins, 35, was sentenced on Tuesday by the U.S. Department of Justice for his…


0 Comments7 Minutes

Windows Update

ALERT: Windows Update Patches Six Active Zero-Day Vulnerabilities

Microsoft’s most recent monthly security updates included remedies for 68 vulnerabilities across its software portfolio, including patches for six actively exploited zero-day vulnerabilities. Twelve of the issues are classified as Critical, two as High, and 55 as Important. This includes the…


0 Comments6 Minutes

Update for Chrome

ALERT: Google Releases Immediate Update for Chrome to Fix Actively Exploited Zero-Day Vulnerability

Google released emergency Update for Chrome web browser on Thursday to patch an actively exploited zero-day vulnerability. The CVE-2022-3723 vulnerability has been identified as a misunderstanding bug in the V8 JavaScript engine. On October 25, 2022, Avast security researchers Jan Vojtek, Milánek,…


0 Comments2 Minutes

Dangers of Storing Passwords

The Dangers of Storing Passwords in Your Computer and What to do About It

Do you or your coworkers keep passwords in an Excel sheet, Word document or Notepad?  The fact is that nearly half of businesses store passwords in spreadsheets and other documents, according to a survey conducted by Pulse on behalf of Hitachi ID, a leading cybersecurity software provider…


0 Comments7 Minutes

Sliver C2

Hackers are Moving to Sliver C2 as an Alternative to Cobalt Strike

Threat actors are abandoning the Cobalt Strike suite in favour of a lesser-known, open-source, cross-platform tool known as Sliver C2. Cobalt Strike has developed as an attack tool for numerous threat actors, including ransomware operations, to place “beacons” on infiltrated networks…


0 Comments6 Minutes

Microsoft Server Misconfiguration

65,000+ Businesses Suffered Data Leaks Due to Microsoft Server Misconfiguration

Microsoft Server Misconfiguration allowed unauthenticated access to some business transaction data pertaining to exchanges between Microsoft and potential customers, such as the planning or possible deployment and provisioning of Microsoft services. The exposure totals 2.4 gigabytes of data, which…


0 Comments3 Minutes

New Malicious Clicker

New Malicious “Clicker Apps” Downloaded by over 20M Users

Sixteen mobile malware apps have been detected posing as legitimate utilities while automatically crawling adverts in the background. The McAfee Mobile Research Team recently discovered new Clicker malware that had infiltrated Google Play. In total, 16 previously available Google Play applications…


0 Comments4 Minutes

Quantum Computing Age

Diffie Advises Security Professionals to Be Prepared for the Quantum Computing Age

The respected cryptography pioneer, Dr. Whitfield Diffie, has advised that anyone interested in system security should take Quantum Computing Age seriously, as it is not going away anytime soon. Dr. Diffie, known for his co-invention of public key cryptography and digital signatures and as the…


0 Comments5 Minutes

Phishing-as-a-Service

Researchers Issue Warning Regarding New Phishing-as-a-Service Model Used by Cyber Criminals

Caffeine, a previously unknown phishing-as-a-service (PhaaS) toolset, is being used by cybercriminals to scale up their attacks and deliver malicious payloads easily. “This platform has a simple UI and comes for a relatively moderate cost while offering its criminal customers a plethora of…


0 Comments4 Minutes