Cloud Consultancy News
WordPress hosting service Kinsta targeted by Google phishing ads
WordPress hosting provider Kinsta is warning customers that Google ads have been observed promoting phishing sites to steal hosting credentials. Kinsta says the phishing attacks aim to steal login credentials for MyKinsta, a key service the company offers to manage...
Microsoft Warns of Hackers Exploiting OAuth for Cryptocurrency Mining and Phishing
Microsoft has warned that adversaries are using OAuth applications as an automation tool to deploy virtual machines (VMs) for cryptocurrency mining and launch phishing attacks. "Threat actors compromise user accounts to create, modify, and grant high privileges to...
WordPress Releases Update 6.4.2 to Address Critical Remote Attack Vulnerability
WordPress has released version 6.4.2 with a patch for a critical security flaw that could be exploited by threat actors by combining it with another bug to execute arbitrary PHP code on vulnerable sites. "A remote code execution vulnerability that is not directly...
Apple Releases Security Updates to Patch Critical iOS and macOS Security Flaws
Apple on Monday released security patches for iOS, iPadOS, macOS, tvOS, watchOS, and Safari web browser to address multiple security flaws, in addition to backporting fixes for two recently disclosed zero-days to older devices. This includes updates for 12 security...
Ceramics-based storage
Video of ceramic storage system prototype surfaces online — 10,000TB cartridges bombarded with laser rays could become mainstream by 2030, making slow hard drives and tapes obsolete. Cerabyte has released a video showcasing the potential of its long-anticipated...
Your work laptop can keep using Windows 10 until 2028 – but it’ll cost you
Microsoft has confirmed that Windows 10 will live on beyond its end of support (EOS) date of October 14, 2025, but users will have to pay up to keep using the platform safely. Although Windows 10 22H2 has already been confirmed to be the final version of the operating...
New Bluetooth Flaw Let Hackers Take Over Android, Linux, macOS, and iOS Devices
A critical Bluetooth security flaw could be exploited by threat actors to take control of Android, Linux, macOS and iOS devices. Tracked as CVE-2023-45866, the issue relates to a case of authentication bypass that enables attackers to connect to susceptible devices...
New Threat Actor ‘AeroBlade’ Targeted US Aerospace Firm in Espionage Campaign
Over the past year, a previously unknown threat actor has been observed launching cyberattacks against an aerospace organisation in the United States, cybersecurity firm BlackBerry reports. Dubbed AeroBlade, the adversary first targeted the organisation in September...
New Report: Unveiling the Threat of Malicious Browser Extensions
Compromising the browser is a high-return target for adversaries. Browser extensions, which are small software modules that are added to the browser and can enhance browsing experiences, have become a popular browser attack vector. This is because they are widely...
How ‘fake’ Lockdown Mode can fool iPhone users into a false sense of security
Researchers at Jamf Threat Labs on Tuesday posted a new report that explains how an iPhone can be , fooling the owner into thinking that their iPhone is secure. Introduced in iOS 16, Lockdown Mode can be enabled if a user believes they are in a situation where...