These include products from Google, D-Link, QNAP, Apple, MicroTik, Oracle, Fortinet, Netgear and Android, with D-Link getting the most mentions. CISA Adds Twelve Known Exploited Vulnerabilities to Catalog | CISA
Apple moves to killing off the password…
Yesterday Apple had its September event where all the new toys were revealed, including iOS 16 – which will be on the new devices announced and available as an upgrade for iPhones going back to 2017. The new iOS and MacOS will both support passkey security rather than passwords. Apple …
Web browser extensions a great idea for functionality but also a cyber security risk – what can you do?
Most browsers offer the option of adding extensions that will add functionality to the browser, however, of course, the threat actors exploit these to carry out various cyber attacks: Chrome extensions with 1.4 million installs steal browsing data (bleepingcomputer.com) Here are the extensions that the McAfee researchers discovered: Netflix Party (mmnbenehknklpbendgmgngeaignppnbe) …
Google elite bug bounty program
I have written before about how good “bug bounties” are for improving everyone’s cyber security, rewarding the white hat hackers and researchers for their work. The Open Source Software Vulnerability Rewards Program (OSS VRP) Now Google has launched a bug bounty program that rewards the ethical technologists for finding and …
Turkish Malware
The trick with this one is that it will delay installation to avoid detection: Turkish malware used to infect machines in 11 countries through fake Google Translate links – The Record by Recorded Future It appears to be a Google Translate or mp3 downloader link, and has infected machines across …