4 security concerns for low-code and no-code development
There’s an increased push for what is being dubbed the citizen developer, coupled with the desire to empower application development and creation by non-developers. This...
CISA Puts Chrome and Magento Zero-Days on Must-Patch List
Another nine bugs added to catalog of known exploited vulnerabilities Read More
Ukraine Defense and Bank Networks DDoS-ed
Russia suspected of intensifying cyber-attacks Read More
ZDI-22-377: Apple macOS libFontParser TTF Font Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Apple macOS. Interaction with the libFontParser library is required to exploit this...
Why Staying Calm May Be One Of The Best Ways Of Keeping Your Kids Safe Online
There are very few guarantees in this world – but experiencing drama when you are a parent is a sure thing! And as a mum...
The Gold Rush of Fraud: Why Scammers Have Flocked to Social Media
There’s millions of dollars to be made in social media. For scammers. New data from the U.S. Federal Trade Commission (FTC) suggests that Americans lost...
25 years on, Microsoft makes another stab at stopping macro malware
Bravo to Microsoft, because it sounds like they’re doing something to improve the security of Office users. Way back in 1995, Microsoft accidentally shipped a...
If NFTs were honest…
If you don't understand what they are, don't feel too bad about it. The truth is that many people don't understand what NFTs are. It's...
DSA-5078 zsh – security update
It was discovered that zsh, a powerful shell and scripting language, did not prevent recursive prompt expansion. This would allow an attacker to execute arbitrary...
ShadowPad has become the RAT of choice for several state-sponsored Chinese APTs
The ShadowPad malware came into the spotlight in 2017 when it was used in two software supply-chain attacks by a suspected Chinese state-sponsored hacker group....