The Seven Most Popular Subjects in Phishing Emails

Phishing has long been a crucial part of attackers’ arsenal. The technique is often deployed against companies and their employees, tricking them into clicking on the provided links and thus initiating various malicious campaigns. To counter the … Continue reading The Seven Most Popular Subjects in Phishing Emails

It’s Final: Microsoft Ends Support for Skype Classic on November 1

In July, Microsoft made the announcement that it’s about to discontinue Skype Classic on September 1st. However, because of the negative feedback, this date got delayed. Unfortunately, the delay is also going to end soon, as Microsoft is expected… Continue reading It’s Final: Microsoft Ends Support for Skype Classic on November 1

Chrome 70 Introduces Sign-In Toggle, Lets You Delete ALL Cookies

Just a couple of days ago, privacy-savvy eyes noticed that Chrome 69 keeps Google cookies even when the user specifically asks it to delete all cookies. What exactly happens when the user tries to clear all cookies from Chrome 69?…Read more
The post … Continue reading Chrome 70 Introduces Sign-In Toggle, Lets You Delete ALL Cookies

Twitter AAAPI Bug Shared User Messages with Unauthorized Parties

Twitter just fixed a vulnerability that may have shared direct messages (DMs) and protected tweets of some users with developers who were not authorized to access the information. It appears that the bug is related to Twitter’s Account Activity A… Continue reading Twitter AAAPI Bug Shared User Messages with Unauthorized Parties

Chrome 69 Keeps Google Cookies When Requested to Delete All Cookies

A Twitter discussion started by Christoph Tavan has revealed that Chrome 69 will keep Google Cookies even when the user specifically asks it to delete all cookies. ““Clear browsing data” -> “Cookies and other site data&#8221… Continue reading Chrome 69 Keeps Google Cookies When Requested to Delete All Cookies

Recently Patched CVE-2018-8373 Used in Active Exploits

CVE-2018-8373 is a severe remote code execution vulnerability which was fixed in August 2018 Patch Tuesday. The vulnerability was located in Internet Explorer and the way it manages objects in memory. At the time the advisory was published, there were…. Continue reading Recently Patched CVE-2018-8373 Used in Active Exploits

macOS Mojave Privacy Feature Bypass Bug Revealed

Security researcher Patrick Wardle has disclosed a new security vulnerability in the latest version of macOS, Mojave, hours before the version was released. The researcher showed the privacy feature bypass in a video shared on Twitter. The original pur… Continue reading macOS Mojave Privacy Feature Bypass Bug Revealed

Equifax Fined £500,000 for Exposing Data of 15 Million UK Citizens

Remember the Equifax breach? The major security havoc affected one of the largest credit reporting companies operating in the USA. As a result of the malicious intrusion, cybercriminals were able to obtain information on millions of users worldwide. Th… Continue reading Equifax Fined £500,000 for Exposing Data of 15 Million UK Citizens

If Exploited, CVE-2018-1149 Peekaboo Flaw Could Hijack CCTV Cameras

CVE-2018-1149 is a new stack buffer overflow zero-day vulnerability which endangers IoT video and security camera. Also known as Peekaboo, the zero-day is affecting security cameras and surveillance equipment that use the NUUO software. If exploited, t… Continue reading If Exploited, CVE-2018-1149 Peekaboo Flaw Could Hijack CCTV Cameras

Xbash: the Four-Headed Dragon of Malware Set Against Windows and Linux

How does a self-spreading malware with cryptomining and ransomware capabilities sound to you? Entirely hypothetical? Not at all. This new malware strain exists and is a real threat not only to Windows servers but also to Linux. It is dubbed…Read more… Continue reading Xbash: the Four-Headed Dragon of Malware Set Against Windows and Linux