Cloud Consultancy News
Binance’s Smart Chain Exploited in New ‘EtherHiding’ Malware Campaign
Threat actors have been observed serving malicious code by utilising Binance's Smart Chain (BSC) contracts in what has been described as the "next level of bulletproof hosting." The campaign, detected two months ago, has been codenamed EtherHiding by Guardio Labs. The...
Cybercriminals Using EvilProxy Phishing Kit to Target Senior Executives in U.S. Firms
Senior executives working in U.S.-based organizations are being targeted by a new phishing campaign that leverages a popular adversary-in-the-middle (AiTM) phishing toolkit named EvilProxy to conduct credential harvesting and account takeover attacks. Menlo Security...
Ten hacker security measures to prevent cyber attacks
The human factor continues to be one of the entry vectors for cyberattacks on organisations. Cybersecurity awareness also remains a pending subject for everyone, although users are increasingly aware of the dangers of the digital world and try to avoid them within...
WordPress Websites Hacked via Royal Elementor Plugin Zero-Day
Security researchers are warning of a critical-severity vulnerability in the Royal Elementor Addons and Templates WordPress plugin that has been exploited as a zero-day for more than a month. Developed by WP Royal, the plugin helps domain admins build their websites...
Microsoft 365 email senders urged to implement SPF, DKIM and DMARC
In the wake of Google’s announcement of new rules for bulk senders, Microsoft is urging Microsoft 365 email senders to implement SPF, DKIM and DMARC email authentication methods. “These Domain Name Service (DNS) email authentication records verify that you are the...
Keeping up with the demands of the cyber insurance market
Cyber insurance has been around longer than most of us think. When American International Group (AIG) launched the first cyber insurance policy in 1997, it stepped into completely unknown territory to gain market share. Now, 26 years later, cyber insurance has made...
Cybersecurity preparedness pays big dividends for businesses
Businesses are taking cybersecurity more seriously by boosting resources and preparedness, according to GetApp. US businesses on the whole are gaining ground against cybercriminals after several years of increasingly severe threats, but the Las Vegas cyberattacks are...
Poor cybersecurity habits are common among younger employees
One in three employees believe their actions do not impact their organisation’s security, according to Ivanti. Unsafe cybersecurity habits among office workers The research also shows that Millennial and Gen Z office workers are more likely to have unsafe...
Eyes everywhere: How to safely navigate the IoT video revolution
Cameras are coming to a connected device near you. Cheap image sensors from old mobile phones are flooding the market and bringing video to the Internet of Things (IoT). Vacuum cleaners, bird feeders, connected cars and even smart ovens now come loaded with cameras...
Google Chrome’s organize tabs will automatically reorder tabs
In a bid to upgrade user experience, the Chrome team is developing an "Organise Tabs" feature, soon to be seen at the top left corner of the browser, adjacent to the tab search function. This new addition would be a natural extension of Tab Groups functionality....