October 6, 2022
Articles CyberSecurity Tips & Tricks

Stop Blurring Your Sensitive Information in Screenshots

Want to hide parts of a screenshot that contain personal info, such as 💳 number? That’s a good idea, but you should stop using tools that pixelate, blur, or use other effects like swirls to hide this info—it’s almost like baiting strangers into trying to see what’s been redacted. Unredacter can easily reveal text hidden […]

Read More
Articles CyberSecurity Technology

Zero day vulnerability in Sophos Firewall exploited by the hackers

Security software company Sophos discovered that attackers were exploiting a new critical zero-day vulnerability to attack its customers’ network. A code injection vulnerability allowing remote code execution was discovered in the User Portal and Webadmin of Sophos Firewall.Due to this,the company has released a patch update for its firewall product. The issue, tracked as CVE-2022-3236 […]

Read More
CyberSecurity News Technology

Use of fake CircleCI Notifications to steal GitHub accounts – 2FA

GitHub is warning its users against the ongoing phishing campaign that started on September 16. “While GitHub itself was not affected, the campaign has impacted many victim organisations”, GitHub informs in an advisory on Wednesday. The hackers behind this have been targeting the users to steal credentials and two-factor authentication (2FA) codes by impersonating the […]

Read More
CyberSecurity News

MALICIOUS NPM PACKAGE CAUGHT MIMICKING MATERIAL TAILWIND – Downloaded 320 Times

A malicious NPM package has been found mimicking as the legitimate software library for Material Tailwind. The rogue package, named material-tailwindcss, has been downloaded 320 times to date. The attack also serves to highlight the software supply chain as an attack surface.

Read More
CyberSecurity News Technology

LESSONS FROM WISEASY HACK – Hackers Steal Passwords For Accessing 140,000 payment terminals

Wiseasy employees accessed sensitive resources from a non-hardened device. Privileged accounts should only be used when required for a particular task

Read More
CyberSecurity Technology

LASTPASS – FACING SECURITY ISSUES AGAIN?

Lastpass- the password management solution which had the beliefs of thousands of users suddenly faced criticism on account of its security incident last month. Lastpass has a record of security incidents in 2011, 2015, 2016,2019,2021,2022.

Read More
CyberSecurity Technology

HP Enterprise Computers were left vulnerable to cyberattacks because of unpatched high-severity security vulnerabilities.

Security researchers have found hidden vulnerabilities in several models of HP’s Business-oriented notebooks that continue to be unpatched, (Sic) Binarily told listeners at the Black Code conference.It said that these flaws are “difficult to detect with TPM measurements.” Firmware flaws can have serious implications as they allow an adversary to achieve long-term persistence on a […]

Read More

Post a blog

Post a Quote