Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Google on Monday revealed that almost 200,000 app submissions to its Play Store for Android were either rejected...
What is MFA bombing? Apple users were targeted using this phishing technique
You notice a system prompt on your iPhone about your password. You click “Don’t allow.” Then it happens...
US probes Ford hands-free driving tech after crashes
The US regulator says it will evaluate Ford’s driver assistance tech after two fatal collisions. Source:: BBC News...
GPU-Powered Windows 365 Cloud PCs with NVIDIA RTX Virtual Workstation for High-End Graphics Workloads
Professional workflows have become more complex with the increased demand for graphics-intensive scenarios. From regular office applications to...
Tesla shares jump after reports of China deal
A reported deal with Chinese search giant Baidu will help pave the way for a rollout of Tesla’s...
Product Safety Report: Aovo M365 Pro E-Scooter (2105-0255)
Source:: UK Gov Product Safety Alerts, Reports and Recalls
Product Safety Report: String Lights, G40 sold via Amazon (2312-0134)
Source:: UK Gov Product Safety Alerts, Reports and Recalls
China-Linked ‘Muddling Meerkat’ Hijacks DNS to Map Internet on Global Scale
A previously undocumented cyber threat dubbed Muddling Meerkat has been observed undertaking sophisticated domain name system (DNS) activities in a likely effort...
Q1 2024 Internet disruption summary
This post is also available in 日本語, 한국어, 繁體中文, 简体中文, Deutsch, Français, Español and Português. Cloudflare’s network spans...
Department of Commerce Announces New Actions to Implement President Biden’s Executive Order on AI
Announcements include draft guidance documents, a draft plan for international standards, and a new measurement program opening for...
Business email compromise: defending your organisation
How to disrupt email phishing attacks that target senior executives or budget holders. Source:: NCSC Guidance
Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM
It comes as no surprise that today’s cyber threats are orders of magnitude more complex than those of the past. And...
New R Programming Vulnerability Exposes Projects to Supply Chain Attacks
A security vulnerability has been discovered in the R programming language that could be exploited by a threat actor to...
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
Multiple critical security flaws have been disclosed in the Judge0 open-source online code execution system that could be exploited to obtain...
New law aims to protect devices from hackers
Speakers, fitness trackers and other internet-connected devices sold in the UK now have to meet new requirements. Source::...
Okta Warns of Unprecedented Surge in Proxy-Driven Credential Stuffing Attacks
Identity and access management (IAM) services provider Okta has warned of a spike in the “frequency and scale”...
Musk in China to discuss enabling full self driving
China is Tesla’s second-biggest market but the company has not enabled autonomous driving in the country. Source:: BBC...
Airline keeps mistaking 101-year-old woman for baby
An IT glitch leaves the cabin crew expecting to welcome a baby on board rather than a centenarian....
Ukraine Targeted in Cyberattack Exploiting 7-Year-Old Microsoft Office Flaw
Cybersecurity researchers have discovered a targeted operation against Ukraine that has been found leveraging a nearly seven-year-old flaw in Microsoft...
Bogus npm Packages Used to Trick Software Developers into Installing Malware
An ongoing social engineering campaign is targeting software developers with bogus npm packages under the guise of a job interview...