Cloud Consultancy News
SMTP Smuggling Allows Spoofed Emails to Bypass Authentication Protocols
SMTP Smuggling was discovered by Timo Longin, a researcher known for DNS attacks, in collaboration with SEC Consult, a cybersecurity consultancy that is part of digital transformation company Eviden. The attack technique, whose details were disclosed on Monday,...
M3 iMac teardown reveals the inside has changed as much as the outside
Although it’s been on shelves for a while, iFixit recently performed a teardown of the M3 iMac, and to no one’s surprise, the internal design and components are a lot like that of the M1 iMac it replaced. The one major change (besides the System on a Chip upgrade) is...
WordPress hosting service Kinsta targeted by Google phishing ads
WordPress hosting provider Kinsta is warning customers that Google ads have been observed promoting phishing sites to steal hosting credentials. Kinsta says the phishing attacks aim to steal login credentials for MyKinsta, a key service the company offers to manage...
Microsoft Warns of Hackers Exploiting OAuth for Cryptocurrency Mining and Phishing
Microsoft has warned that adversaries are using OAuth applications as an automation tool to deploy virtual machines (VMs) for cryptocurrency mining and launch phishing attacks. "Threat actors compromise user accounts to create, modify, and grant high privileges to...
WordPress Releases Update 6.4.2 to Address Critical Remote Attack Vulnerability
WordPress has released version 6.4.2 with a patch for a critical security flaw that could be exploited by threat actors by combining it with another bug to execute arbitrary PHP code on vulnerable sites. "A remote code execution vulnerability that is not directly...
Apple Releases Security Updates to Patch Critical iOS and macOS Security Flaws
Apple on Monday released security patches for iOS, iPadOS, macOS, tvOS, watchOS, and Safari web browser to address multiple security flaws, in addition to backporting fixes for two recently disclosed zero-days to older devices. This includes updates for 12 security...
Ceramics-based storage
Video of ceramic storage system prototype surfaces online — 10,000TB cartridges bombarded with laser rays could become mainstream by 2030, making slow hard drives and tapes obsolete. Cerabyte has released a video showcasing the potential of its long-anticipated...
Your work laptop can keep using Windows 10 until 2028 – but it’ll cost you
Microsoft has confirmed that Windows 10 will live on beyond its end of support (EOS) date of October 14, 2025, but users will have to pay up to keep using the platform safely. Although Windows 10 22H2 has already been confirmed to be the final version of the operating...
New Bluetooth Flaw Let Hackers Take Over Android, Linux, macOS, and iOS Devices
A critical Bluetooth security flaw could be exploited by threat actors to take control of Android, Linux, macOS and iOS devices. Tracked as CVE-2023-45866, the issue relates to a case of authentication bypass that enables attackers to connect to susceptible devices...
New Threat Actor ‘AeroBlade’ Targeted US Aerospace Firm in Espionage Campaign
Over the past year, a previously unknown threat actor has been observed launching cyberattacks against an aerospace organisation in the United States, cybersecurity firm BlackBerry reports. Dubbed AeroBlade, the adversary first targeted the organisation in September...