How EvilProxy Bypasses Microsoft 2FA

How EvilProxy Uses Indeed.com to Phish Microsoft 365 Users Phishing is a type of cyberattack that involves sending fraudulent emails or other messages that appear to come from legitimate sources, such as banks, social media platforms, or job portals. The goal of phishing is to trick the recipients into clicking on malicious links or attachments, […]

Tor Now Permitted by Windows Defender!

Tor Browser, a popular software that allows users to browse the web anonymously and access the dark web, is no longer detected as malware by Microsoft Defender, the built-in antivirus program of Windows 10. Microsoft Defender, formerly known as Windows Defender, is a security software that provides real-time protection against various threats, such as viruses, […]

QR Codes are the New Phish in Town

QR codes are everywhere these days. They are square barcodes that can store various kinds of data, such as URLs, text, or contact information. They can be scanned by a smartphone camera to access the encoded information with a single tap. They offer convenience and efficiency for both businesses and consumers, especially in the context […]

NSA Launches AI Security Center to Protect National Security Systems and Defense Industrial Base

The National Security Agency (NSA) has announced the establishment of a new Artificial Intelligence Security Center (AISC) that will serve as the focal point for developing and integrating secure and responsible AI capabilities within the U.S. national security systems and the defense industrial base. The AISC will also leverage the NSA’s foreign intelligence insights and […]

Microsoft introduces AI-powered Paint Co-Creator to Windows Insiders

Microsoft has announced the release of a new feature for its classic Paint app, called Paint Co-Creator. This feature uses artificial intelligence to help users create stunning artworks with minimal effort. Paint Co-Creator is currently available for Windows Insiders in the Dev Channel, and will be rolled out to all Windows 11 users in the […]

How Chinese hackers breached US State Department and stole 60,000 emails in Microsoft hack

The US Senate Intelligence Committee recently revealed that Chinese hackers were behind a massive cyberattack that compromised the email accounts of thousands of US State Department employees and other government agencies. The hackers exploited a vulnerability in Microsoft’s Exchange Server software, which is widely used by organizations to manage their email communications. The breach, which […]

How a New Pixel-Stealing Exploit Can Expose Your Passwords and Other Sensitive Data

Passwords are supposed to protect our online accounts and data from unauthorized access. But what if hackers could bypass passwords and steal them directly from your screen? That’s the scary scenario that a new pixel-stealing exploit can enable, according to security researchers from the University of Michigan and the University of Illinois at Urbana-Champaign. The […]

Zero Font Size Phishing: A Sneaky Trick to Bypass Outlook Security

Phishing is a common cyberattack technique that involves sending fraudulent emails to trick recipients into clicking on malicious links, opening malicious attachments, or providing sensitive information. Phishing emails often try to impersonate legitimate organizations or individuals, and use various methods to evade detection by email security tools. One of these methods is called ZeroFont phishing, […]

Net Neutrality Rules to Be Restored by FCC

The Federal Communications Commission (FCC) is planning to reinstate net neutrality rules that were repealed by the Trump administration in 2017, according to sources familiar with the matter. The move comes as Democrats have gained a majority on the five-member panel, which regulates the nation’s communications industry. Net neutrality is the principle that internet service […]