23
Jul
2023

Week in review: VirusTotal data leak, Citrix NetScaler zero-day exploitation

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Citrix ADC zero-day exploitatation: CISA…

Dating Apps And Sites: Mitigating Chargebacks In 2023
23
Jul
2023

The Game Of Drones Of Hovering Cybersecurity Risks

How easy is it to buy a drone? As simple as swiping your card or putting in your details to…

New Outlook App
23
Jul
2023

Microsoft force-migrating Windows Mail & Calendar apps to Outlook app in August

Microsoft will retire the Windows Mail and Calendar applications on Windows 10 and Windows 11 at the end of the…

Microsoft
22
Jul
2023

Stolen Microsoft key offered widespread access to Microsoft cloud services

The Microsoft consumer signing key stolen by Storm-0558 Chinese hackers provided them with access far beyond the Exchange Online and…

Windows 11
22
Jul
2023

Windows 11 23H2 to give you greater control over power consumption

Microsoft is making it easier to see how much energy your apps use in Windows 11 over a given period…

Multiple DDoS botnets were observed targeting Zyxel devicesSecurity Affairs
22
Jul
2023

Multiple DDoS botnets were observed targeting Zyxel devicesSecurity Affairs

Researchers warn of several DDoS botnets exploiting a critical flaw tracked as CVE-2023-28771 in Zyxel devices. Fortinet FortiGuard Labs researchers…

Citrix
22
Jul
2023

Over 15K Citrix servers likely vulnerable to CVE-2023-3519 attacks

Thousands of Citrix Netscaler ADC and Gateway servers exposed online are likely vulnerable against a critical remote code execution (RCE)…

10 Essential Cybersecurity Tips for Small Businesses
22
Jul
2023

10 Essential Cybersecurity Tips for Small Businesses

This article presents ten essential cybersecurity tips tailored specifically for small businesses. So let’s get to it! In today’s interconnected…

10 Essential Cybersecurity Tips for Small Businesses
22
Jul
2023

10 Essential Cybersecurity Tips for Small Businesses

This article presents ten essential cybersecurity tips tailored specifically for small businesses. So let’s get to it! In today’s interconnected…

Phishers Exploiting Google Docs to Harvest Crypto Credentials
22
Jul
2023

Phishers Exploiting Google Docs to Harvest Crypto Credentials

This attack starts with creating a Google document directly sent to the user via email from this spoofed no-reply@google.com address. Check…

Dating Apps And Sites: Mitigating Chargebacks In 2023
22
Jul
2023

Anonymous Sudan’s Hacktivism: A Genuine Cause Or Just A Facade?

In January 2023, a cybercriminal group identifying themselves as “Anonymous Sudan” emerged as hacktivists. Throughout their operations, including OpSweden and…

2023 OWASP Top-10 Series: Introduction
22
Jul
2023

2023 OWASP Top-10 Series: Introduction

In early June 2023, OWASP released the final version of the OWASP API Security Top-10 list update. At that time…