In plain sight: Malicious ads hiding in search results

Sometimes there’s more than just an enticing product offer hiding behind an ad. One thing is true: Malware developers are deeply invested in improving their malware and exploring different ways to compromise end users. Malware spreading through ads is nothing new; for a long time, cybercriminals have had their sights fixed on online advertising networks as a distribution … More In plain sight: Malicious ads hiding in search results

ESET Research: Spy group exploits WPS Office zero day; analysis uncovers a second vulnerability

ESET researchers discovered a remote code execution vulnerability in WPS Office for Windows (CVE-2024-7262). The vulnerability was being exploited by APT-C-60, allegedly a South Korea-aligned cyberespionage group, to target East Asian countries. When examining the root cause, ESET discovered another way to exploit the faulty code (CVE-2924-7263). Following a coordinated disclosure process, both vulnerabilities are … More ESET Research: Spy group exploits WPS Office zero day; analysis uncovers a second vulnerability

Beware of Ticket Scammers on Social Media: Don’t Let Fake Promises Ruin Your Concert Experience

As the excitement builds for Coldplay’s upcoming gigs at Croke Park and fans eagerly await tickets for the much-anticipated Oasis reunion in 2025, the spectre of ticket scammers looms larger than ever. These opportunistic fraudsters are perfectly poised to exploit the fervour of fans desperate to catch their favourite bands live. The Allure of Last-Minute … More Beware of Ticket Scammers on Social Media: Don’t Let Fake Promises Ruin Your Concert Experience

Old devices, new dangers: The risks of unsupported IoT tech

In the digital graveyard, a new threat stirs: Out-of-support devices becoming thralls of malicious actors. Outdated devices are often easy targets for attackers, especially if they have vulnerabilities that can be exploited and no patches are available due to their end-of-life status. Hacks of outdated or vulnerable devices are an issue, but why would anyone attempt … More Old devices, new dangers: The risks of unsupported IoT tech

That’s how easy it is to hack your phone

The world of Android threats is quite vast and intriguing. In this episode, Becks and Lukas demonstrate how easy it is to take over your phone, with some added tips on how to stay secure. Android threats are a serious business. Among them is the Blue Ducky script, which exploits the CVE-2023-45866 Android device vulnerability.  By running … More That’s how easy it is to hack your phone