Category: Articles
-
Hackers use Google Chrome extensions to access your Gmail
Kimsuky used Google Chrome extensions to steal the target’s Gmail emails. Kimsuky also known as Thallium, Velvet Chollima is a North Korean threat organization. It conducts cyber-espionage against diplomats, journalists, government agencies, university academics, and politicians through spear phishing. Initially targeting South Korean targets, the threat actors gradually expanded their operations to the United States…
-
Google cautions consumers of Android device remote issues
Google’s security research site warns of a troubling group of vulnerabilities disclosed in Samsung semiconductors powering dozens of Android devices. The vulnerability could be exploited within a short period, according to Google. Google Project Zero in-house security researchers reported 18 zero-day vulnerabilities in Samsung Exynos modems over the last few months. These include four…
-
Google adds another AI dollop to Workspace
A select group of trustworthy testers” will soon have access to ChatGPT-like text creation in Google Workspace. With companies like OpenAI’s ChatGPT and DALL-E capturing the zeitgeist by storm with human prompt-driven generative AI. It was only a matter of time until Google joined the battle. In conjunction with Google Cloud, Google launched…
-
Cyber Insurance: Strengthening Cyber Defenses
Cyber insurance companies are losing money. Their loss ratios – total claims plus the insurer’s expenses divided by total premiums received. These are now routinely around 60%, posing an existential danger to the insurance sector. Moreover, potentially renders cyber risk uninsurable owing to diminishing profitability. The insurance industry is combating its losses by raising rates.…
-
PoC for a major Microsoft Word RCE problem revealed
Over the weekend, a proof-of-concept for CVE-2023-21716, a severe vulnerability in Microsoft Word that permits remote code execution, was disclosed. The vulnerability was given a severity level of 9.8 out of 10. Microsoft Office 365 parent company addressed it in the February Patch Tuesday security patches, along with a handful of remedies. The low attack complexity, with…
-
Your Ultimate Guide to Choosing the Right Web Hosting Solution
When you decide to build a website, you will confront a slew of difficulties. Whether you want to scale your business with a website or start a blog one thing is certain. You’ll need a reliable web hosting service, as this will ideally be your site’s permanent home. Regardless of your degree of technical expertise,…
-
Google Cloud storage is not as secure as we believe
Google Cloud Logs are a detective’s best friend. Google Cloud may have some worrying security issues. It allows threat actors to steal data without being detected by the cloud storage platform. According to cybersecurity website experts, who discovered that Google Cloud Platform (GCP) logs are often used to identify assaults. They comprehend what threat actors have accomplished,…
-
Web and Mobile Applications Essential Elements
Web and mobile applications have become an essential part of our daily lives. Technology advancements and increasing demand for digital solutions have led to a continued rise in web and mobile applications. Moreover, Web applications refer to software programs that run on a web server and can be accessed through a web browser. These applications…
-
Window 11 sends alerts when typing passwords in insecure Applications
Enhanced Phishing protection in Windows 11 Windows 11 comes with an advanced feature of enhanced protection. When users type their passwords in insecure applications this feature warns them. Typing passwords in spreadsheets, word processor, and text editor are enough for attackers to steal the passwords and get access to the important data. According to Sinclaire…
-
Microsoft Exchange servers are under attack for phishing via OAuth App
Attackers get access to Microsoft Exchanges Servers and use them for phishing emails. Attackers adopt various ways of getting access to the important information of users. Attack through Oauth App is one of the attempts to hijack systems to send phishing emails to the users. According to Microsoft 365 Defender team, the attackers attack those…