News

Category

Phishing attacks are evolving to become more sophisticated, as cybercriminals invest in new methods to deceive individuals into divulging sensitive information or installing malicious software. One of the recent trends in phishing involves the utilization of QR codes, CAPTCHAs, and steganography. These techniques are employed to carry out attacks and it is important to understand...
Read More
When an employee at your organization forgets their password, it typically initiates a frustrating and time-consuming process. The employee usually needs to contact the IT department and wait for a response, leading to decreased work productivity, heightened anxiety, and potential jeopardy to deadlines. However, there are better ways to handle the password reset process, such...
Read More
Scopus is an abstract and citation database used by researchers, academics, and institutions to track and analyze scientific literature. The database covers a wide range of disciplines, including science, technology, medicine, social sciences, and arts and humanities. Using Scopus, users can quickly assess the relevance and impact of a particular scientific article through the abstracts...
Read More
A new cybercrime operation called ‘SecuriDropper’ has emerged, which uses a method to bypass the ‘Restricted Settings’ feature in Android to install malware on devices and obtain access to Accessibility Services. Restricted Settings is a security feature introduced with Android 13 that prevents side-loaded applications (APK files) installed from outside Google Play to access powerful...
Read More
Threat actors are exploiting the ‘Citrix Bleed’ vulnerability, identified as CVE-2023-4966, to focus on governmental, technological, and legal institutions across regions such as the Americas, Europe, Africa, and the Asia-Pacific area. According to findings from Mandiant researchers, there are four continuous campaigns aimed at susceptible Citrix NetScaler ADC and Gateway devices, with these attacks having...
Read More
A figure known as Prolific Puma, identified by security experts, has been offering cybercriminals the service of shortening links for over four years without attracting attention due to their discreet operations. Within just a month, Prolific Puma has managed to create numerous domains, including many within the U.S. top-level domain (usTLD), to facilitate the distribution...
Read More
Google has implemented a substantial improvement in Chrome’s online security by automatically converting insecure HTTP requests into HTTPS requests for all users. This functionality, known as HTTPS-Upgrades, aims to enhance the security of older links that originally used HTTP by initially trying to establish a connection via the encrypted HTTPS protocol. While a limited introduction...
Read More
Meta has introduced a revolutionary AI system that can rapidly interpret visual information from the human brain. This system records thousands of measurements of brain activity each second and reconstructs the way our minds perceive and analyze images. The research paper describes these findings as a significant advancement in the real-time decoding of the ongoing...
Read More
Mobile devices have significantly boosted our contemporary lifestyles, enabling us to perform a wide range of tasks, including in-store purchases, online bill payments, and the secure storage of financial information, health records, passwords, and images. Data.ai reports that the pandemic expedited the growth of established mobile practices, such as a 25% annual increase in finance-related...
Read More
Security experts have discovered that a significant number of IT administrators are employing tens of thousands of easily guessable passwords to safeguard their portal access, which exposes enterprise networks to potential cyberattacks. Among the over 1.8 million administrator credentials examined, more than 40,000 of them were simply “admin,” indicating a widespread preference for the default...
Read More
1 2 3 4 9