FTC to ban BetterHelp from sharing mental health data with advertisersThe Federal Trade Commission (FTC) has proposed to ban the online counseling service BetterHelp from sharing...
Month: March 2023
Microsoft is testing a modern Windows 11 volume mixer
Microsoft is testing a modern Windows 11 volume mixerMicrosoft is testing a new and modern-looking Windows 11 volume mixer accessible via the taskbar Quick Settings panel...
How to prevent Microsoft OneNote files from infecting Windows with malware
How to prevent Microsoft OneNote files from infecting Windows with malwareThe seemingly innocuous Microsoft OneNote file has become a popular file format used by hackers to...
Ciberdelincuentes atacan a bufetes de abogados con el malware GootLoader y FakeUpdates
Ciberdelincuentes atacan a bufetes de abogados con el malware GootLoader y FakeUpdatesSeis bufetes de abogados diferentes fueron atacados en enero y febrero de 2023 como parte...
Vulnerabilidad crítica en Oracle WebLogic (CVE-2023-21839)
Vulnerabilidad crítica en Oracle WebLogic (CVE-2023-21839)Se ha publicado el código de explotación para una vulnerabilidad crítica en Oracle WebLogic Server. La vulnerabilidad, identificada como CVE-2023-21839 […]Leer...
Informe anual de seguridad del Browser Security revela los principales riesgos y puntos ciegos de la navegación
Informe anual de seguridad del Browser Security revela los principales riesgos y puntos ciegos de la navegaciónComo interfaz de trabajo principal, el navegador juega un papel...
Cisco parcha falla crítica de Web UI RCE en múltiples teléfonos IP
Cisco parcha falla crítica de Web UI RCE en múltiples teléfonos IPCisco ha abordado una vulnerabilidad de seguridad crítica que se encuentra en la interfaz de...
La Agencia de Ciberseguridad de EE.UU. da la voz de alarma sobre las capacidades letales de Royal Ransomware
La Agencia de Ciberseguridad de EE.UU. da la voz de alarma sobre las capacidades letales de Royal RansomwareLa Agencia de Seguridad de Infraestructura y Ciberseguridad de...
Vulnerabilidad crítica en Oracle WebLogic (CVE-2023-21839)
Vulnerabilidad crítica en Oracle WebLogic (CVE-2023-21839)Se ha publicado el código de explotación para una vulnerabilidad crítica en Oracle WebLogic Server. La vulnerabilidad, identificada como CVE-2023-21839 […]Leer...
2023 Browser Security Report Uncovers Major Browsing Risks and Blind Spots
2023 Browser Security Report Uncovers Major Browsing Risks and Blind SpotsAs a primary working interface, the browser plays a significant role in today's corporate environment. The...
Clustering Phishing Campaign’s Rogue and Fraudulent and Malicious Hosting Infrastructure Pointing to Massive IPFS Web 3.0 Hosting Infrastructure Abuse – An OSINT Analysis
Clustering Phishing Campaign’s Rogue and Fraudulent and Malicious Hosting Infrastructure Pointing to Massive IPFS Web 3.0 Hosting Infrastructure Abuse – An OSINT Analysis Dear blog readers,...
USENIX Security ’22 – Jiaheng Zhang , Tiancheng Xie, Thang Hoang, Elaine Shi, Yupeng Zhang – ‘Polynomial Commitment with a One-to-Many Prover and Applications’
USENIX Security ’22 – Jiaheng Zhang , Tiancheng Xie, Thang Hoang, Elaine Shi, Yupeng Zhang – ‘Polynomial Commitment with a One-to-Many Prover and Applications’Our thanks to...
Autonomous Vehicles Need No Drugs Or Drink To Be Bad Drivers
Autonomous Vehicles Need No Drugs Or Drink To Be Bad DriversHumans often get cited for being influenced by drugs or alcohol when they make terrible decisions....
USENIX Security ’22 – Ning Luo, Samuel Judson, Timos Antonopoulos, Ruzica Piskac, Yale University; Xiao Wang – ‘ppSAT: Towards Two-Party Private SAT Solving’
USENIX Security ’22 – Ning Luo, Samuel Judson, Timos Antonopoulos, Ruzica Piskac, Yale University; Xiao Wang – ‘ppSAT: Towards Two-Party Private SAT Solving’Our thanks to USENIX...
Play Ransomware gang has begun to leak data stolen from City of Oakland
Play Ransomware gang has begun to leak data stolen from City of OaklandThe Play ransomware gang has finally begun to leak the data stolen from the...
New cyberattack tactics rise up as ransomware payouts increase
New cyberattack tactics rise up as ransomware payouts increaseWhile phishing, business email compromise (BEC), and ransomware still rank among the most popular cyberattack techniques, a mix...
BidenCash leaks 2.1M stolen credit/debit cards
BidenCash leaks 2.1M stolen credit/debit cardsThe dark web carding site BidenCash recently leaked for free a collection of approximately 2 million stolen payment card numbers. An...
FiXS, a new ATM malware that is targeting Mexican banks
FiXS, a new ATM malware that is targeting Mexican banksResearchers at Metabase Q discovered a new ATM malware, dubbed FiXS, that was employed in attacks against Mexican banks...
Security Affairs newsletter Round 409 by Pierluigi Paganini
Security Affairs newsletter Round 409 by Pierluigi PaganiniA new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs are...
Malware: 5 Tips for Fighting the Malicious Software
Malware: 5 Tips for Fighting the Malicious Software Malware—the term seems to be at the center of the news every day, with each headline telling of...
McAfee Awarded Best Protection by the Labs at AV-TEST
McAfee Awarded Best Protection by the Labs at AV-TEST Each year the independent labs at AV-TEST announce their best products in IT security, and McAfee has...
New TPM 2.0 flaws could let hackers steal cryptographic keys
New TPM 2.0 flaws could let hackers steal cryptographic keysThe Trusted Platform Module (TPM) 2.0 specification is affected by two buffer overflow vulnerabilities that could allow...
Bing Chat has a secret ‘Celebrity’ mode to impersonate celebrities
Bing Chat has a secret ‘Celebrity’ mode to impersonate celebritiesA secret Bing Chat 'Celebrity' mode allows users to instruct the AI to impersonate celebrities, answering questions...
Ransomware gang leaks data stolen from City of Oakland
Ransomware gang leaks data stolen from City of OaklandThe Play ransomware gang has begun to leak data from the City of Oakland, California, that was stolen...
New cyberattack tactics rise up as ransomware payouts increase
New cyberattack tactics rise up as ransomware payouts increaseWhile phishing, business email compromise (BEC), and ransomware still rank among the most popular cyberattack techniques, a mix...
5 valuable skills your children can learn by playing video games
5 valuable skills your children can learn by playing video gamesGaming can help your children build and sharpen a range of life skills that will stand...
Mastodon vs. Twitter: Know the differences
Mastodon vs. Twitter: Know the differencesLooking for an alternative to Twitter and thinking about joining the folks flocking to Mastodon? Here’s how the two platforms compare...
Why your data is more valuable than you may realize
Why your data is more valuable than you may realizeThe data trail you leave behind whenever you're online is bigger – and more revealing – than...
SwiftSlicer: New destructive wiper malware strikes Ukraine
SwiftSlicer: New destructive wiper malware strikes UkraineSandworm continues to conduct attacks against carefully chosen targets in the war-torn country The post SwiftSlicer: New destructive wiper malware...
Are you in control of your personal data? – Week in security with Tony Anscombe
Are you in control of your personal data? – Week in security with Tony AnscombeData Privacy Week is a reminder to protect your data – all...



























