Forescout Technologies has identified over a dozen security vulnerabilities in routers produced by Taiwanese networking company DrayTek, including several critical flaws that could enable remote hacking attacks. The collection of 14 vulnerabilities, collectively named DRAY, affects more than 20 different DrayTek Vigor router models. While DrayTek has issued firmware patches to address all of the […]
Blog Grid
Microsoft has identified the root cause of an outage that disrupted its Microsoft 365 services on Thursday morning, according to a company statement on social media. By 9 a.m., over 23,000 users had reported issues with Microsoft 365 on Downdetector. The outage affected several key services, including Outlook, Teams, cloud services, Exchange Server, Skype for […]
Sensitive data such as names, addresses, and credit card details have been compromised. Protecting your credit card information from cybercriminals just became more challenging due to a significant data breach involving a payment gateway provider that has impacted nearly 1.7 million people. According to BleepingComputer, this breach is the latest in a series of attacks […]
Recent research has uncovered a cunning new technique that cybercriminals are using to force Chrome browser users to reveal their Google account passwords. The attack, which uses malware known as StealC, traps users in a frustrating situation by locking their browser in kiosk mode. This mode blocks the F11 and ESC keys, preventing users from […]
A viral TikTok trend, dubbed the “Chase Bank Glitch,” lured many with the promise of quick and easy money, only to leave participants thousands of dollars in debt and facing potential legal trouble. The trend involved exploiting a flaw in JPMorgan Chase’s ATMs, which allowed users to deposit checks without sufficient funds and immediately access […]
Eight security vulnerabilities have been discovered in Microsoft applications for macOS that could potentially be exploited by attackers to gain elevated privileges or access sensitive data. These flaws allow malicious actors to bypass the macOS permissions model, which relies on Apple’s Transparency, Consent, and Control (TCC) framework. “If exploited successfully, the attacker could inherit any […]