News

Vulnerability in Totolink Range Extender Firmware Allows Unauthorized Access
Endpoint Security
Vulnerability in Totolink Range Extender Firmware Allows Unauthorized Access
Totolink range extenders are at risk due to a firmware bug that leads to unauthenticated root-level Telnet service, allowing potential device takeovers. Security researchers encourage ...
Vibe Hacking How AI is Transforming Cybercrime's Landscape
Cybersecurity
Vibe Hacking: How AI is Transforming Cybercrime’s Landscape
The evolution of cybercrime from skill-based activities to AI-driven "vibe hacking" is reshaping attack strategies. By utilizing AI tools, cybercriminals gain access to advanced capabilities ...
Logitech's macOS Applications Disrupted by Expired Code-Signing Certificate
Application Security
Logitech’s macOS Applications Disrupted by Expired Code-Signing Certificate
Logitech's macOS applications, Options+ and G Hub, faced functionality issues after their code-signing certificate expired, preventing users from launching the apps on Apple systems. This ...
Ni8mare Vulnerability Threatens N8N Workflow Automation Platform
Application Security
Ni8mare Vulnerability Threatens N8N Workflow Automation Platform
A critical vulnerability discovered in the N8N workflow automation platform enables remote, unauthenticated attackers to gain control over systems. Details emerge on this severe risk, ...
Black Cat's SEO Poisoning Tactics Target Software Downloaders
News
Black Cat’s SEO Poisoning Tactics Target Software Downloaders
The Black Cat cybercrime group is leveraging fraudulent software download sites in a new SEO-driven attack campaign, delivering backdoor malware. The tactic involves SEO poisoning ...
OwnCloud Urges Users to Implement Multi-factor Authentication for Enhanced Security
Identity and Access Management
OwnCloud Urges Users to Implement Multi-factor Authentication for Enhanced Security
OwnCloud recommends multi-factor authentication to prevent unauthorized access to user data via compromised credentials. This security measure adds an essential layer, mitigating the risk of ...
Microsoft Acknowledges Issues With Outlook Encryption Feature
Application Security
Microsoft Acknowledges Issues With Outlook Encryption Feature
A flaw in classic Outlook prevents users from opening encrypted emails, affecting security and efficiency. Microsoft outlines the known issue tied to this encryption feature, ...
Stalkerware Vendor's Guilty Plea A Rare Legal Victory in Consumer Spyware Prosecution
Cybersecurity
Stalkerware Vendor’s Guilty Plea: A Rare Legal Victory in Consumer Spyware Prosecution
A significant legal breakthrough marks only the second successful prosecution of a consumer spyware vendor in over ten years by the US government, revealing complex ...
Chrome Extensions Masquerading as AITOPIA Pose Risk
Application Security
Chrome Extensions Masquerading as AITOPIA Pose Risk
Security analysts identified two harmful Chrome extensions, downloaded 900,000 times, masquerading as legitimate AITOPIA tools. These extensions extracted users' browser activity and personal data. Google’s ...
Microsoft Alters Exchange Online User Email Limitations After Customer Pushback
Cybersecurity
Microsoft Alters Exchange Online User Email Limitations After Customer Pushback
Microsoft has postponed its intended changes to Exchange Online, initially meant to restrict email recipients per message, following feedback from customers displeased by the limitations ...