'

Microsoft disables online Windows App Installer after attackers abuse it

Microsoft disables online Windows App Installer after attackers abuse it

Microsoft has disabled the App Installer functionality that allowed Windows 10 apps to be installed directly from a web page by clicking on a link that used the ms-appinstaller URI scheme. This functionality has been heavily abused in recent months by different threat actors to deploy ransomware and other malicious implants. “Threat actors have likely … Read more

Guarding against DDoS attacks during high-traffic periods

Guarding against DDoS attacks during high-traffic periods

Distributed denial-of-service (DDoS) attacks are a year-round threat. However, as many security practitioners can attest, DDoS attacks are particularly prolific during high-traffic times like the holiday season. The holidays are typically a time when organizations have reduced resources, with staff taking vacation and fewer cyber resources dedicated to monitoring networks and applications. Cybercriminals often take … Read more

VPN to protect against DDoS attacks on Twitch

VPN to protect against DDoS attacks on Twitch

Swarming or DDoS attacks pose a threat to streamers. Multiple devices flooding your internet connection with traffic can cause slowdowns or crashes. A reliable VPN provider always maintains a DDoS-protected server. Your data goes through a secure server, making it harder for attackers to target your actual IP address. In this article, we will continue … Read more

The best iOS fax app to protect your privacy

The best iOS fax app to protect your privacy

Mobile faxing is experiencing a significant surge in popularity, driven by both businesses and individuals seeking paperless alternatives. Unsurprisingly, many are now opting for mobile fax apps. If you’re an iPhone user on the lookout for a mobile fax app, consider yourself fortunate. We have created a comprehensive guide to help you pick the best … Read more

Highly exploited Chromium bug traced to a Google OAuth endpoint

Highly exploited Chromium bug traced to a Google OAuth endpoint

An undocumented Google OAuth endpoint has been identified to be the root of the notorious info stealing exploit that is being widely implemented by various threat actors in their codes since it appeared in October 2023. The critical exploit, which allows the generation of persistent Google cookies through token manipulation and enables continuous access to … Read more

How Russia’s NoName057(16) could be a new model for hacking groups

How Russia’s NoName057(16) could be a new model for hacking groups

As Ukraine and its allies find themselves in the crosshairs of Russian hacking groups, the cyber realm has become a virtual battlefield of strategic warfare. Among them, a series of politically motivated distributed denial-of-service (DDoS) attacks by the pro-Russian hacktivist group NoName057(16) has resulted in a wave of public coverage detailing the group’s operations. While … Read more