New Phishing Scheme Using Fake Copyright Infringement Notices

A new phishing campaign targeting Facebook users has been identified by cybersecurity firm Trustwave. In this campaign, hackers use fake copyright infringement notices to trick users into giving away their account details. The phishing messages claim that Facebook will delete the user’s account within 48 hours unless they fill out …

LastPass Security Breach: Encrypted Passwords at Risk

LastPass, a popular password manager, announced that an unauthorized party accessed the company’s archived backups of its production data on a third-party cloud-based storage service. According to the company’s investigation, a threat actor accessed the cloud storage environment in August 2022 with information obtained from an earlier incident. Although the …

DraftKings Data Breach Exposes Personal Information of 68,000 Customers

In late November 2022, sports betting firm DraftKings announced that it had suffered a data breach affecting approximately 68,000 customers. The company stated that the breach resulted from a credential stuffing attack, in which attackers obtained credentials from a third-party source and attempted to use them to access DraftKings accounts. …

FBI Program Tasked with Infrastructure Security Compromised

The FBI program tasked with ensuring critical infrastructure security has been compromised by hackers, who now offer access to the program’s data on the dark web. The breach was initially disclosed by Brian Krebs of Krebs on Security, who claims that the data was for sale on a cybercrime forum …

Data Breach at Sequoia One Exposes Sensitive Customer Information

What do you do when your most personal information has been compromised? This is likely the question that customers of Sequoia One asked themselves earlier this month as they were informed that the company had been hacked. Sequoia One specializes in the management of human resources, benefits, and payroll. For …

Cisco Reports Critical IP Phone Vulnerability

As a business owner, it’s important to stay informed about potential vulnerabilities that could impact your organization. Recently, Cisco reported a critical vulnerability, tracked as CVE-2022-20968, affecting its IP Phone 7800 and 8800 Series. This new vulnerability is caused by inadequate input validation of packets using the Cisco Discovery Protocol. …

Google Chrome Releases Two New Features

Google Chrome is one of the more commonly used web browsers. Over the years, though, Chrome has gained a reputation for utilizing a large portion of a computer’s memory. This can be a problem if you’re running other resource-intensive tasks and don’t want to slow things down. With the latest …

Last Microsoft Edge Update for 2022

A new version of Microsoft Edge is available for Windows, macOS, and Linux. While the update is relatively small, it contains two feature upgrades and significant security fixes, including one for the Chromium engine’s “Type confusing in V8” vulnerability. Vulnerability Fix Unsurprisingly, one of the most significant improvements in this …

Gmail Improves Search Feature

Google has started using machine learning to understand what users are looking for within their email. Google has reported that it has enhanced its email search to produce more relevant results by paying closer attention to previous searches. Although the email provider already offered a search feature with various filters …