Hackers Now Exploit Google Sheets To Spread CSV Malware
After previously exploiting Microsoft Excel for formula injection attacks, hackers have now turned their attention…
ALL stories
After previously exploiting Microsoft Excel for formula injection attacks, hackers have now turned their attention…
Integrity is one of three vital components of securing information held within an organisation. Integrity…
A new Linux backdoor trojan discovered, Jack’d app exposes private user images, and Huddle House POS system breach on episode 213 of our daily cybersecurity podcast.
Not all hackers are intent on stealing data or victimising users. Some use their skills…
Cybercriminals use many techniques to extort money from unsuspecting victims. One recent technique uses a…
The dangers of low security on the Internet of Things (IoT) devices once again surfaced…
Mozilla has recently released its browser version Firefox 65 that brings enhanced content blocking. With…
A new sextortion scam claims to infect users through popular adult website, Chrome to warn of lookalike URLs, and Houzz suffers user data breach on episode 212 of our daily cybersecurity podcast.
In iOS 12, Apple implemented the use of Shortcuts App into its voice assistant Siri. These…
The popular home remodelling website Houzz has informed its customers that it suffered a data breach.…