Category: Articles

  • Why are cybercriminals using more Domain Shadowing?

    Why are cybercriminals using more Domain Shadowing?

    There have been 12,197 cases reported for domain shadowing between April 2022 and June 2022. Domain Shadowing is a subdomain of DNS hijacking. In domain shadowing, the hijacker compromises the DNS of a legitimate domain to use in malicious activities but will never compromise the legitimate DNS that already exists.  The attacker uses these subdomains…

  • DELL Strengthens its vProxy

    Upstream Operating Software got fixed vProxy is an online appliance that is used to recover and protect VMware virtual machines There have been detected two critical bugs in vProxy to which Fell has issued patches. This way they have found a fix against bugs for their upstream Linux operating system. vProxy inherits bugs from the…

  • Google and Meta are in the news for privacy violation

    Google and Meta are in the news for privacy violation

    A million dollars penalty was fined by South Korea According to reports, Google is fined A$ 74 million and Meta is fined A$ 33 million for a privacy violation on Wednesday 14th Sep, 2022. The privacy panel reported that Google and Meta didn’t take permission before using the data for analyzing and collecting information regarding…

  • What do hackers do for more realistic phishing attacks?

    What do hackers do for more realistic phishing attacks?

    Sock pockets, a new campaign by hackers. Iranian group of hackers is using phishing techniques where these hackers use multiple email accounts and personas that target into thinking people the conversation is real. Hackers send an email while CCing some other email, that is under their control, and start a fake conversation. The researchers named…

  • What costs do businesses pay due to fake reviews?

    What costs do businesses pay due to fake reviews?

    Fake reviews can cause huge financial losses to businesses. According to studies, fake reviews cause $152 billion in direct damage annually. There are reports where companies bear a loss of millions of dollars due to fraudulent online reviews. This not only impacts businesses financially but also takes up employees’ headspace and time. It has been…

  • What’s new about Microsoft word?

    What’s new about Microsoft word?

    Edit, Review, and View documents in Microsoft word. There is a new update in Microsoft word. This new feature has brought Microsoft word to the forefront from the back. The new feature allows users to (@mentions) tag people in their shared documents. The new feature will also allow users to assign, track and create tasks…

  • These fraudulent antivirus apps for Android install a harmful banking malware

    These fraudulent antivirus apps for Android install a harmful banking malware

    SharkBot is still evading Google Play Store security. Researchers have cautioned that the SharkBotDropper malware, which was discovered in multiple antivirus applications in April, has invaded the Google Play Store once more. The report claims two more Android antivirus applications have been identified to have the malware. These were meant to steal online banking credentials.…

  • Microsoft Defender might be at fault if Google Chrome is not responding

    Microsoft Defender might be at fault if Google Chrome is not responding

    Microsoft Defender’s security infrastructure has been mistakenly providing false positive security alerts to users of platforms such as Google Chrome, Discord, and Twitch. Users are seeing a notice titled “Behavior:Win32/Hive.ZY,” which Microsoft claims is designed to alert users of potentially harmful files that are frequently downloaded via channels like email. Perhaps reassuringly, “Hive” is the…

  • Cloud servers are proven to be an effective entry point for cybercriminals

    According to the survey, cloud servers are the most popular attack vector for cyberattacks. New data shows cloud servers are now the number one access point for cyberattacks. With 41% of companies identifying, it is the primary entry point. The situation is only growing worse, with a 10% increase in hacks utilizing cloud servers as…

  • Dangerous Google Chrome extensions were installed on over a million devices

    Dangerous Google Chrome extensions were installed on over a million devices

    Chrome extensions pose as legitimate browser services. Researchers discovered a collection of malicious Google Chrome extensions aimed to track browsing activities on over 1.4 million devices. McAfee – a computer security company stated the objective of the scam is to change the victim’s browser cookies each time they visit an e-commerce website. This will earn…