cybersecurity
(98)
5 Ways AI Influences Cybersecurity Practices
Cybersecurity is an ever-growing problem as the world becomes increasingly digital. And as our technology becomes more sophisticated, so do cyber attacks. AI technology is continually advancing and has become part of many people’s daily lives....
Alex · 14 August · 68Enhanced Security: Google Introduces Weekly Chrome Updates for Better Protection
Google is taking stronger action against security vulnerabilities and will soon roll out updates for Chrome every week. If you want to stay protected, you will have to restart the browser much more often. Google Chrome is the world's most widely used...
Kelly · 09 August · 39Patchday: Critical malware vulnerabilities pose threat to Android 11, 12 and 13
Google and other Android device manufacturers have released their monthly collective security updates. Attackers can attack Android in many ways and paralyze devices via DoS attack or even execute malicious code. Some manufacturers have now released...
Kelly · 09 August · 49Inside the Mega Glitch: Unlocking Hidden Windows Functions with a Secret Microsoft Tool
This probably wasn't planned this way: During a so-called bug bash for Windows 11, Microsoft employees accidentally shared a link to the StagingTool, a program that is used internally at Microsoft to activate hidden features in Windows 11. Sometimes...
Kelly · 03 August · 82Faster Fixes: Ubuntu's Plan to Reduce Linux Kernel Package Vulnerabilities
Kleber Souza, an engineer at Canonical who maintains Linux kernel packages for Ubuntu, has announced a new kernel update cycle. The new cycle, which is codenamed "4/2", involves generating additional SU kernel package updates (Security Update) that i...
Jacob Enderson · 03 August · 69Security updates: Attackers can compromise Aruba switches
Certain switch models from Aruba are vulnerable. The developers have closed a security hole. Network admins should update their Aruba switches to the latest version for security reasons. If this is not done, attackers can compromise the operating sys...
Kelly · 03 August · 46Gigabyte Motherboards have a firmware backdoor
Researchers from Eclypsium have discovered anomalous behavior on systems with motherboards from the Taiwanese company Gigabyte Technology. The UEFI firmware used in these motherboards, without informing the user during system boot, performed substitution and execution of an executable file for the Windows platform. Subsequently, the executed file w...
Kelly · 01 June · 64Web Security Best Practices for Safeguarding Your Website from Cyber Threats
In today's digital landscape, where websites serve as the storefronts and communication hubs for businesses, ensuring robust web security is paramount. Cyber threats are constantly evolving, making it imperative for website owners to implement effect...
Steve Martin · 30 May · 48Linux IPv6 "Route of Death" 0day Vulnerability in the Kernel
Details of an unpatched (0-day) vulnerability (CVE-2023-2156) in the Linux kernel have been disclosed. This vulnerability allows an attacker to crash the system by sending specially crafted IPv6 packets (packet-of-death). The issue only manifests whe...
Jacob Enderson · 17 May · 83 · 1Critical Security Vulnerability in Google Chrome
Google has released an update for the Chrome web browser during the night, which addresses at least one critical security vulnerability. This vulnerability allows attackers to smuggle in and execute malicious code. In total, the update includes fixes...
Alex · 17 May · 56Linux Kernel Vulnerabilities Grant Local Attackers Root Privileges
Two components of the Linux kernel contain security vulnerabilities that grant local attackers root shell access. A first exploit has been made public. Two components of the Linux kernel are affected by security vulnerabilities that allow local attac...
Den W. · 10 May · 144 · 2Leakage of Intel private keys used for firmware validation of MSI
During an attack on the information systems of MSI, hackers were able to extract over 500 GB of the company's internal data, including source code for firmware and related tools for their assembly. The attackers demanded $4 million for non-disclosure, but MSI refused and some data was published publicly. Among the published data were Intel's privat...
Kelly · 07 May · 100 · 1Warning about new malware: Attackers can access entire Windows systems
Security experts are warning about malware that allows attackers to gain remote access to Windows PCs. We show you how to protect yourself. The security experts from "Bleeping Computer" are warning Windows users about a new malware called "Lobshot."...
Den W. · 04 May · 8610 ways to protect yourself from smishing
Mobile phones have revolutionalised how we communicate with each other. We can talk to nearly anyone worldwide, simply by reaching into our pockets. The trouble is that having a phone on you at all times is not only beneficial to you but also to crim...
Alex · 20 April · 117Your Main Guide to Vulnerability Assessment and Its Many Types
Vulnerability assessments are used to define, detect, categorize, and prioritize defects and vulnerabilities in applications, devices, and networks that might expose organizations' products, services, code, and applications to attack. Security flaws allow malicious actors to exploit an organization's apps and systems. Comprehensive vulnerability a...
Alex · 30 March · 44Top 5 Android Hacking Tools for Penetration Testers
Mobile devices are convenient for our lives and can also be used to commit fraud. According to the latest statistics, 70% of online scams occur through mobile platforms. Staggering. But how to avoid them in the first place? Well, android penetration testing is one of the answers. In the realm of ethical hacking, hacking is used to improve system...
Alex · 27 February · 93