NEWS
Hackers Are Cashing In With Hijacked IP Addresses
Online raiders are stealing IP addresses and converting them to cash by selling them to so-called proxyware services.Malicious actors are planting proxyware on computers without the owner’s knowledge, then selling the unit’s IP address to a proxyware service, making...
How Generative AI Will Transform Cybersecurity
Microsoft last week announced that, just as it did with .NET years ago, it will be putting generative AI into everything, including security.Back in the .NET days, I joked that Microsoft was so over the top with .Net that the bathrooms were renamed Men.net and...
Apple fixes two zero-days exploited to hack iPhones and Macs
Apple has released emergency security updates to address two new zero-day vulnerabilities exploited in attacks to compromise iPhones, Macs, and iPads."Apple is aware of a report that this issue may have been actively exploited," the company said when describing the...
10-year-old Windows bug with ‘opt-in’ fix exploited in 3CX attack
A 10-year-old Windows vulnerability is still being exploited in attacks to make it appear that executables are legitimately signed, with the fix from Microsoft still "opt-in" after all these years. Even worse, the fix is removed after upgrading to Windows 11.On...
Microsoft OneNote will block 120 dangerous file extensions
Microsoft has shared more information on what malicious embedded files OneNote will soon block to defend users against ongoing phishing attacks pushing malware.The company first revealed that OneNote will get enhanced security in a Microsoft 365 roadmap entry...
Emotet malware distributed as fake W-9 tax forms from the IRS
A new Emotet phishing campaign is targeting U.S. taxpayers by impersonating W-9 tax forms allegedly sent by the Internal Revenue Service and companies you work with.Emotet is a notorious malware infection distributed through phishing emails that in the past contained...
Microsoft pushes OOB security updates for Windows Snipping tool flaw
Microsoft released an emergency security update for the Windows 10 and Windows 11 Snipping tool to fix the Acropalypse privacy vulnerability.Now tracked as CVE-2023-28303, the Acropalypse vulnerability is caused by image editors not properly removing cropped image...
FBI: Business email compromise tactics used to defraud U.S. vendors
The Federal Bureau of Investigation is warning companies in the U.S. of threat actors using tactics similar to business email compromise that allow less technical actors to steal various goods from vendors.Typical business email compromise (BEC) attacks focus on...
How Do I Get My Phone To Stop Tracking My Activity?
Our phones are multifunctional devices that help us in many ways. However, every phone activity leaves some kind of digital print, similar to our fingerprints. Almost like creating our digital identity, who we are in this digital world. Sometimes we have a feeling...