UpdateAgent malware variant impersonates legitimate macOS software

The new variant of UpdateAgent malware is also capable of dropping adware against macOS. The IT security researchers at Microsoft Security Intelligence have discovered a new variant of  UpdateAgent (aka…

WinRAR vulnerability allowed attackers to remotely hijack systems

The vulnerability in WinRAR trialware could be abused by a remote attacker for executing arbitrary code on any system thus, getting an opportunity to launch a range of attacks. According…

What Is Conti Ransomware?

Conti ransomware is an extremely damaging malicious actor due to the speed with which encrypts data and spreads to other systems. The cyber-crime action is thought to be led by…

This monster of a phishing campaign is after your passwords

Microsoft has detailed an unusual phishing campaign aimed at stealing passwords that uses a phishing kit built using pieces of code copied from other hackers’ work. A “phishing kit” is…

What Is Extended Detection and Response (XDR)? Features, Benefits, and Beyond

Overloaded security teams, poor visibility, and threat alert overload have quite an impact when it comes to detecting and effectively responding to cyber threats. Since today’s cyberattacks are extremely tricky…

South African police arrest eight men suspected of targeting widows in romance scams

South African police have arrested eight suspects in connection to romance scams that defrauded at least 100 women. The gang used “sob stories” as a lure to push women —…

Microsoft Teams: Now your video calls support end-to-end encryption

Microsoft has rolled out a public preview of E2EE for one-to-one Teams calls, bringing its enterprise platform up to par with Facebook’s consumer apps, WhatsApp and Messenger.  Microsoft announced the…

Google reports new highs for governments requesting content to be removed

Google issued its Content Removal Transparency Report for the first half of 2021, and warned it has continued to see a rising trend in requests from governments, as they pass…

Distributed Denial of Service Attacks Against Russia Have Tripled

Distributed Denial of Service, otherwise known as DDoS attacks are online attacks in which legitimate users are prevented from accessing their target online location. The attack happens by flooding the…

Duckduckgo vs Google: A Security Comparison and How to Maximize Your Privacy

Are you preoccupied with privacy? You’ve come to the right place. In today’s guide, I’ll go through everything you should know about Duckduckgo vs Google, how each of them works…