Your Data is more valuable than you may realise

The data trail you leave behind whenever you’re online is bigger, and more revealing, than you may think. It’s data privacy day this Saturday. Or if you’re based in Europe, then it would be data protection day for you. The day serves as a reminder of...

Why is Google Sending me Spam and Phishing Emails?

Cyber criminals have found a new way to send spam and phishing emails that allow them to bypass email scanners. They are using Google Ad invites for their email delivery. Administrator of Google Ads accounts can add new users to their account by sending out invites....

Hosting and Delivering Malware on GitHub Codespaces

Researchers from Trend Micro recently demonstrate how GitHub Codespaces can easily be configured to act as a web server for distributing malware. Launched in November 2022, GitHub Codespaces allows developers to deploy cloud-hosted platforms in virtualised containers...

Rise in Microsoft OneNote Attachments in Phishing Emails

There’s been a rise of attackers using Microsoft OneNote attachments to spread malware and infect victim’s computers. Previously attackers would use Microsoft word and excel attachments for distributing their malware. Those attachments would contain macros...

Critical Exploits Available for Popular WordPress Plugins

Proof of concept exploits for critical vulnerabilities in three popular wordpress plugins have been made publicly available. The plugins are “Paid Memberships Pro’, ‘Easy Digital Downloads’ and ‘Survey Marker’. These plugins are...

Malicious Python Lolipop packages in the Wild

Malicious python packages designed to steal information from developers’ systems have been recently discovered by Fortinet. The packages were uploaded to the Python Package Index between January 7 and 12 this year by an author named lolipop. The names of the...

Upgrade to The Latest Version of Git

If you’re a developer then you need to make sure you have upgraded to the latest version of Git. Git just patched two critical severity security vulnerabilities that could allow attackers to perform remote code execution. The security vulnerabilities were...