by Ludwig Wideskär | Dec 20, 2019 | Newsletters
A group of hackers have hacked into computer systems at BMW and Hyundai. BMW and Hyundai among the influential Large and valuable companies are well known and thus also attract more cyber attacks. Hackers have managed to break into BMW's network and place ...
by Ludwig Wideskär | Dec 13, 2019 | Newsletters
Vulnerable IoT devices can act as a gateway for attackers, but there are recommendations for improving protection. If an attacker gains access to the IoT device, the entire network may be subject to other attacks or hijackings. IoT devices and Smart TVs are ...
by Ludwig Wideskär | Dec 6, 2019 | Newsletters
The Cstealer Trojan attacks Windows systems and steals account information from victims' Google Chrome. The account information is sent to a MongoDB database, which can be read if the Trojan code has been analyzed. Account information is sent to a MongoDB database Trojan that ...
by Ludwig Wideskär | November 29, 2019 | Newsletters
A new phishing campaign has been discovered, this time against domain administrators for Microsoft Office 365. Hijacked domain addresses and credible messages are used to deceive victims. New phishing campaign against administrators A new phishing campaign has been discovered. The...
by Ludwig Wideskär | November 22, 2019 | Newsletters
A form of buffer overflow can be used to execute malware on a WhatsApp user. All that is required is its phone number and a special MP4 file. Critical vulnerability detected in WhatsApp In order for an attacker to exploit the vulnerability, ...
by Ludwig Wideskär | November 14, 2019 | Newsletters
The BlueKeep vulnerability has been exploited in a cyberattack, where affected devices have begun to break into cryptocurrencies. Affected computers were using Windows and had not updated to the latest security updates. BlueKeep uses RDP to execute malware ...