6
MarHow to prevent Microsoft OneNote files from infecting Windows with malware
The seemingly innocuous Microsoft OneNote file has become a popular file format used by hackers to spread malware and breach […]
28
FebGoogle Chrome optimizations improve battery life on Macs
The latest version of Google Chrome for macOS (110.0.5481.100) includes new optimizations that increase battery life on MacBooks. Google’s tests […]
21
FebGoDaddy: Hackers stole source code, installed malware in multi-year breach
Web hosting giant GoDaddy says it suffered a breach where unknown attackers have stolen source code and installed malware on […]
8
FebMicrosoft launches new AI chat-powered Bing and Edge browser
Microsoft announced on Tuesday a new version of its Bing search engine powered by a next-generation OpenAI language model more […]
3
FebNew Nevada Ransomware targets Windows and VMware ESXi systems
A relatively new ransomware operation known as Nevada seems to grow its capabilities quickly as security researchers noticed improved functionality […]
30
JanQNAP fixes critical bug letting hackers inject malicious code
QNAP is warning customers to install QTS and QuTS firmware updates that fix a critical security vulnerability allowing remote attackers to […]
27
JanMicrosoft starts force upgrading Windows 11 21H2 devices
Microsoft has started the forced rollout of Windows 11 22H2 to systems running Windows 11 21H2 that are approaching their […]
25
JanApple fixes actively exploited iOS zero-day on older iPhones, iPads
Apple has backported security patches addressing a remotely exploitable zero-day vulnerability to older iPhones and iPads. Apple said that the […]
23
JanNew ‘Hook’ Android malware lets hackers remotely control your phone
A new Android malware named ‘Hook’ is being sold by cybercriminals, boasting it can remotely take over mobile devices in […]
19
JanPayPal accounts breached in large-scale credential stuffing attack
PayPal is sending out data breach notifications to thousands of users who had their accounts accessed through credential stuffing attacks […]