cybersecurity (75)

5 Ways AI Influences Cybersecurity Practices

Cybersecurity is an ever-growing problem as the world becomes increasingly digital. And as our technology becomes more sophisticated, so do cyber attacks. AI technology is continually advancing and has become part of many people’s daily lives....

Alex · 14 August · 67

Enhanced Security: Google Introduces Weekly Chrome Updates for Better Protection

Google is taking stronger action against security vulnerabilities and will soon roll out updates for Chrome every week. If you want to stay protected, you will have to restart the browser much more often. Google Chrome is the world's most widely used...

Kelly · 09 August · 38

Patchday: Critical malware vulnerabilities pose threat to Android 11, 12 and 13

Google and other Android device manufacturers have released their monthly collective security updates. Attackers can attack Android in many ways and paralyze devices via DoS attack or even execute malicious code. Some manufacturers have now released...

Kelly · 09 August · 43

Inside the Mega Glitch: Unlocking Hidden Windows Functions with a Secret Microsoft Tool

This probably wasn't planned this way: During a so-called bug bash for Windows 11, Microsoft employees accidentally shared a link to the StagingTool, a program that is used internally at Microsoft to activate hidden features in Windows 11. Sometimes...

Kelly · 03 August · 80

Faster Fixes: Ubuntu's Plan to Reduce Linux Kernel Package Vulnerabilities

Kleber Souza, an engineer at Canonical who maintains Linux kernel packages for Ubuntu, has announced a new kernel update cycle. The new cycle, which is codenamed "4/2", involves generating additional SU kernel package updates (Security Update) that i...

Jacob Enderson · 03 August · 67

Security updates: Attackers can compromise Aruba switches

Certain switch models from Aruba are vulnerable. The developers have closed a security hole. Network admins should update their Aruba switches to the latest version for security reasons. If this is not done, attackers can compromise the operating sys...

Kelly · 03 August · 45

Gigabyte Motherboards have a firmware backdoor

Researchers from Eclypsium have discovered anomalous behavior on systems with motherboards from the Taiwanese company Gigabyte Technology. The UEFI firmware used in these motherboards, without informing the user during system boot, performed substitution and execution of an executable file for the Windows platform. Subsequently, the executed file w...

Kelly · 01 June · 61

Web Security Best Practices for Safeguarding Your Website from Cyber Threats

In today's digital landscape, where websites serve as the storefronts and communication hubs for businesses, ensuring robust web security is paramount. Cyber threats are constantly evolving, making it imperative for website owners to implement effect...

Steve Martin · 30 May · 47

Linux IPv6 "Route of Death" 0day Vulnerability in the Kernel

Details of an unpatched (0-day) vulnerability (CVE-2023-2156) in the Linux kernel have been disclosed. This vulnerability allows an attacker to crash the system by sending specially crafted IPv6 packets (packet-of-death). The issue only manifests whe...

Jacob Enderson · 17 May · 83 · 1

Critical Security Vulnerability in Google Chrome

Google has released an update for the Chrome web browser during the night, which addresses at least one critical security vulnerability. This vulnerability allows attackers to smuggle in and execute malicious code. In total, the update includes fixes...

Alex · 17 May · 51

Linux Kernel Vulnerabilities Grant Local Attackers Root Privileges

Two components of the Linux kernel contain security vulnerabilities that grant local attackers root shell access. A first exploit has been made public. Two components of the Linux kernel are affected by security vulnerabilities that allow local attac...

Den W. · 10 May · 144 · 2

Leakage of Intel private keys used for firmware validation of MSI

During an attack on the information systems of MSI, hackers were able to extract over 500 GB of the company's internal data, including source code for firmware and related tools for their assembly. The attackers demanded $4 million for non-disclosure, but MSI refused and some data was published publicly. Among the published data were Intel's privat...

Kelly · 07 May · 100 · 1

Warning about new malware: Attackers can access entire Windows systems

Security experts are warning about malware that allows attackers to gain remote access to Windows PCs. We show you how to protect yourself. The security experts from "Bleeping Computer" are warning Windows users about a new malware called "Lobshot."...

Den W. · 04 May · 86

Cybersecurity: The best methods and technology to protect yourself or your business

In today's digital age, personal and business information is constantly at risk of being compromised, making it important for individuals and organizations to take proactive measures to protect themselves from cyber threats. With the advancements i...

Alex · 03 May · 72

10 ways to protect yourself from smishing

Mobile phones have revolutionalised how we communicate with each other. We can talk to nearly anyone worldwide, simply by reaching into our pockets. The trouble is that having a phone on you at all times is not only beneficial to you but also to crim...

Alex · 20 April · 117

Your Main Guide to Vulnerability Assessment and Its Many Types

Vulnerability assessments are used to define, detect, categorize, and prioritize defects and vulnerabilities in applications, devices, and networks that might expose organizations' products, services, code, and applications to attack. Security flaws allow malicious actors to exploit an organization's apps and systems. Comprehensive vulnerability a...

Alex · 30 March · 43