Category: Articles

  • Phoney Chrome upgrades distributed via Hacked websites

    Phoney Chrome upgrades distributed via Hacked websites

    Unsuspecting users are exposed to malware after hackers compromise websites and insert scripts that display false Google Chrome automatic update problems. Since November 2022, the campaign has been running. However, according to the cybersecurity website expert, it picked up speed after February 2023. Moreover, it began to target people who spoke Japanese, Korean, and Spanish. Numerous websites,…

  • AI Tools Can Easily Crack Most Passwords

    AI Tools Can Easily Crack Most Passwords

    It’s time to reconsider your password if you believe it to be strong. A recent study from the cybersecurity website demonstrates how fast and conveniently AI Tools can decipher your password. According to statistics, 51% of frequently used passwords can be broken in about a minute. The security service website utilized PassGAN, a password generator…

  • WordPress Sites Infected with Balada Injector Malware Campaign

    WordPress Sites Infected with Balada Injector Malware Campaign

    Since 2017, it’s been reported that over a million WordPress websites have been infected by malware known as Balada Injector.   According to the cybersecurity website, various vulnerabilities in themes and plugins are abused in this comprehensive effort to compromise WordPress websites. Every few weeks, the attacks are known to occur in waves.   Ongoing campaign…

  • Microsoft Outlook concerning email problems resolved

    Microsoft Outlook concerning email problems resolved

    Utilize Microsoft Outlook to record and submit videos to OneDrive Soon, certain Microsoft Office 365 Outlook users will be able to record and publish videos. In addition to reading their communications on the platform, they would be able to record videos as well.   The new feature will enable Outlook Mobile app users to record videos…

  • Microsoft claims Cloud PCs cannot be benchmarked

    Microsoft claims Cloud PCs cannot be benchmarked

    Microsoft is saying that there are simply too many variables to Cloud PCs. Microsoft has explained why benchmarking cloud PCs is an extremely difficult procedure that, in many cases, is just not possible. In a recent blog post, Senior Product Manager for Microsoft Windows 365 Cloud PC and Azure Virtual Desktop, detailed why it’s virtually…

  • Google Play Store will allow users to delete their account

    Google Play Store will allow users to delete their account

    The new Google Play Store data deletion policy is giving more authority to users.  It mandates that Android developers should give customers an online choice to erase their profiles. Moreover, in-app data has been made public by Google Workspace parent company.   Beginning in early 2024, the new policy will give Google Play users greater…

  • Rorschach ransomware so far has the quickest encryption

    Rorschach ransomware so far has the quickest encryption

    Malware experts identified Rorschach as a new ransomware outbreak with “technically unique features” after a cyberattack on a U.S.-based business. According to the cybersecurity website, researchers noticed one of the skills is encryption speed. This would make Rorschach the fastest ransomware threat currently. The researchers reported that the hackers used a flaw in a threat monitoring…

  • Phishing assaults are experiencing a significant increase

    Phishing assaults are experiencing a significant increase

    Researchers report a 5x increase in phishing email attacks year over year. Due to the explosive growth in phishing and other email-borne hacks over the past year, experts have advised small and medium-sized companies to be especially cautious of them. According to a study that examined information from 35 million global participants, since 2022 phishing…

  • The Evolution of IcedID: From Banking Fraud to malware Delivery

    New versions of IcedID no longer possess the capability for unusual online banking fraud. It concentrates on spreading more malware on compromised systems.   According to the cybersecurity website, since late last year, three different hackers have used these new variants in seven operations. Moreover, all these operations have as their primary objective; the distribution of…

  • Microsoft is stepping up its efforts to prevent hazardous emails

    Microsoft is stepping up its efforts to prevent hazardous emails

    Microsoft is launching a new Exchange Online security feature. Moreover, it is likely that after 90 days of administrators being notified to secure them, any emails sent from “persistently vulnerable exchange servers” will be throttled and eventually stopped. These Exchange servers are found in on-premises or hybrid settings. They are either running out-of-date software or…