You can never be too careful when browsing the web nowadays, with data scams being so prevalent and all. We have to be extra vigilant and constantly careful with the way we share online data because you never know how or where the hackers are lurking.

Chrome Extension login Security

One way to protect your information is to use different passwords for your various online accounts. It’s important to make sure that those passwords are strong and unpredictable as well, or else you might open yourself up to possible fraud.

How Google is Helping

Google is doing its part to keep user data protected online. The tech giant has developed a technology that will alert users whenever there’s a potential risk to data security.

To achieve this goal, Google recently announced the introduction of an extension that will activate a visual prompt whenever it sees you using a “weak or “unsafe” username and password. That way, it gives you the chance to change your password before scammers can use it to hack you.

This is known as the Password Checkup Chrome extension. Users can Continue reading

According to reports, a team of Nocturnus researchers at Cyber reason recently discovered an Astaroth Trojan campaign with the ability to abuse GAS Tecnologia and the Avast security software. The hackers use this weak point to plant malicious modules and steal user information.

Astaroth Trojan attack

The main aim of the campaign is to access user information and it does that by taking advantage of legitimate operating system processes. Once it breaches the machine’s security, the campaign is able to steal confidential credentials and clipboard usage as well as important keystate information.

The Cofense security firm was the first to identify the Continue reading

LG Device Manager VulnerabilityA privilege escalation flaw has been discovered which could affect the online safety and privacy of LG laptop users. According to the online security expert who discovered the flaw, this loophole is relatively easy for hackers to take advantage of.

Security expert and researcher Jackson T. found the flaw while analyzing the LG Device Manager system and in doing so was able to track the flaw as CVE-2019-8372. At the time, Jackson was merely evaluating the LG Device Manager’s low-level hardware access Continue reading

Dark-Nexus Botnet

Cybersecurity experts have revealed a new IoT botnet, dubbed as Dark Nexus, that launches distributed denial-of-service (DDoS) attacks.

This is an emerging IoT type of botnet revealed by Bitdefender, and used to launch DDoS attacks.

The botnet working mechanism is spreading by exploiting and launching credential stuffing attacks against a wide range of IoT devices such as routers from ASUS, DLink, Dasan Zhone, thermal cameras, and video recorders.

Bitdefender revealed that ‘the scanners are used as a finite state machine that models Telnet protocol plus the other infection steps, the attacker provides commands basing on the output of previous commands’

You might be interested to learn:
How to spy a Mobile Phone Without Accessing

The name itself “Dark Nexus” comes from strings which are printed on botnet banner, some experts have revealed that despite the originality of codes of botnet features they have some Continue reading

Networking equipment giant Cisco on Monday confirmed they were the victim of a hacking attack on July 28, 2022 after the attackers managed to break into an employee’s personal Gmail account that contained passwords synced within their web browser systems.

Cybersecurity Cisco compromised

“Starting access to the Cisco’s VPN system was achieved via the effectual compromise of one of their employee’s personal Gmail account,” Cisco Talos claimed in a detailed report. “The victim had enabled password syncing via Google Chrome and had stored their Cisco login infos in their browser, enabling these nots to synchronize to their Google account.”

The exposure comes as hackers associated with the AwakenCybers ransomware gang posted a list of files from their attack to their data leak website on August 9.

The breakout information, according to Talos, included the files saved inside a Box cloud storage folder that was connected with the hacked employee’s profile and is not believed to have included any valuable infos.

Apart from the credential theft, there was also another attack of phishing involved where the opponent resorted to methods like “vishing” (way of voice phishing) & multi-factor authentication attempt to trick a victim into providing access to their Continue reading