Apple patched ninth zero-day bug exploited in the wild this year

Apple has patched two iOS zero-day flaws that “could have been actively exploited” to gain access to older iPhone, iPad, and iPod devices.   Memory corruption and use after free…

Norton 360 antivirus to allow you to mine Ethereum crypto

As a way to protect customers from dangerous mining software, NortonLifelock has incorporated the option to mine Ethereum cryptocurrency right within its Norton 360 antivirus software.   This new mining…

Fancy Product Designer – WordPress plugin zero-day vulnerability found

Threat actors have actively exploited a zero-day vulnerability in the Fancy Product Designer plugin for WordPress sites to upload malware.   Fancy Product Designer is a visual product configurator for…

Microsoft warns about phishing attack by Nobelium group spoofing USAID

Microsoft has issued a warning that a Russian-backed hacking outfit known as Nobelium is currently executing a phishing attack and has managed to access the US Agency for International Development’s…

FBI will share compromised passwords with Have I Been Pwned

  The FBI will begin sharing compromised passwords acquired during law enforcement investigations with Have I Been Pwned’s ‘Password Pwned’ service in the near future.   Pwned Passwords is a…

Malvertised Fake AnyDesk: Trojanized AnyDesk found on Google Ads

Cybersecurity researchers at crowdstrike revealed the takedown of a sophisticated malvertising network that targeted AnyDesk and delivered a weaponized installation of the remote desktop software via fake Google adverts in…

Forget DARK WEB. Telegram is the new marketplace for illegal activities and cybercrime

According to a cybersecurity study of the messaging platform, millions of people’s private data is being shared openly on groups and channels with thousands of members.     Telegram –…