Rise in Microsoft OneNote Attachments in Phishing Emails

There’s been a rise of attackers using Microsoft OneNote attachments to spread malware and infect victim’s computers. Previously attackers would use Microsoft word and excel attachments for distributing their malware. Those attachments would contain macros...

Critical Exploits Available for Popular WordPress Plugins

Proof of concept exploits for critical vulnerabilities in three popular wordpress plugins have been made publicly available. The plugins are “Paid Memberships Pro’, ‘Easy Digital Downloads’ and ‘Survey Marker’. These plugins are...

Malicious Python Lolipop packages in the Wild

Malicious python packages designed to steal information from developers’ systems have been recently discovered by Fortinet. The packages were uploaded to the Python Package Index between January 7 and 12 this year by an author named lolipop. The names of the...

Upgrade to The Latest Version of Git

If you’re a developer then you need to make sure you have upgraded to the latest version of Git. Git just patched two critical severity security vulnerabilities that could allow attackers to perform remote code execution. The security vulnerabilities were...

The Case for Running Ad Blockers

Johannes Ullrich released a public service announcement today on why you must run an adblocker when using the internet. He claims that ad networks are not doing enough due diligence on the ads that they run on their networks. He provided examples of Google search...