A Critical Zero-Day Vulnerability in Chrome and Firefox Could Affect Many Other Software Packages
A new zero-day vulnerability has been discovered in Google Chrome and Mozilla Firefox, two of the most popular web browsers in the world. The vulnerability, which is being actively exploited by hackers, could also affect many other software packages that use a common media encoding library. The vulnerability, identified as CVE-2023-5217, is a heap buffer […]
Microsoft introduces AI-powered Paint Co-Creator to Windows Insiders
Microsoft has announced the release of a new feature for its classic Paint app, called Paint Co-Creator. This feature uses artificial intelligence to help users create stunning artworks with minimal effort. Paint Co-Creator is currently available for Windows Insiders in the Dev Channel, and will be rolled out to all Windows 11 users in the […]
How Chinese hackers breached US State Department and stole 60,000 emails in Microsoft hack
The US Senate Intelligence Committee recently revealed that Chinese hackers were behind a massive cyberattack that compromised the email accounts of thousands of US State Department employees and other government agencies. The hackers exploited a vulnerability in Microsoft’s Exchange Server software, which is widely used by organizations to manage their email communications. The breach, which […]
How a New Pixel-Stealing Exploit Can Expose Your Passwords and Other Sensitive Data
Passwords are supposed to protect our online accounts and data from unauthorized access. But what if hackers could bypass passwords and steal them directly from your screen? That’s the scary scenario that a new pixel-stealing exploit can enable, according to security researchers from the University of Michigan and the University of Illinois at Urbana-Champaign. The […]
Zero Font Size Phishing: A Sneaky Trick to Bypass Outlook Security
Phishing is a common cyberattack technique that involves sending fraudulent emails to trick recipients into clicking on malicious links, opening malicious attachments, or providing sensitive information. Phishing emails often try to impersonate legitimate organizations or individuals, and use various methods to evade detection by email security tools. One of these methods is called ZeroFont phishing, […]
Net Neutrality Rules to Be Restored by FCC
The Federal Communications Commission (FCC) is planning to reinstate net neutrality rules that were repealed by the Trump administration in 2017, according to sources familiar with the matter. The move comes as Democrats have gained a majority on the five-member panel, which regulates the nation’s communications industry. Net neutrality is the principle that internet service […]
890 Universities’ Students’ SSNs, DoBs, PII Hacked and Leaked
National Student Clearinghouse, a non-profit organization that provides educational reporting, verification, and data exchange services, has disclosed a data breach that affected 890 colleges and universities. The breach occurred between May 17 and May 20, 2023, when an unauthorized actor exploited a zero-day vulnerability in the MOVEit Transfer secure file transfer web application (CVE-2023-34362) that […]
Microsoft CoPilot AI – Coming to Win 11 Now!
Microsoft Copilot, the AI-powered assistant that aims to help users with various tasks across Windows, Microsoft 365, Bing, and Edge, will roll out with the Windows 11 22H2 update next week. The update, which will be available for free to eligible Windows 10 and Windows 11 users, will also bring over 150 new features and […]
Forget Spam – Microsoft Teams Phishing is The New Weapon
Ransomware groups are using a new tactic to gain access to corporate networks: phishing Microsoft Teams users. A security researcher has discovered a phishing campaign that targets Microsoft Teams accounts and steals them for sale on the dark web. The phishing campaign was spotted by Trusec researcher Cedric Pernet, who shared his findings with BleepingComputer. […]
Russia, China Take Lead in Who Has The Biggest Bot Farm
Bot attacks are a serious threat to the security and performance of websites, mobile apps, and APIs. They can be used to steal data, hijack accounts, disrupt services, or manipulate online markets. According to a recent report by Imperva¹, a cybersecurity company that specializes in bot mitigation, most of the bot attacks originate from China […]