Home Search
Weekly - search results
If you're not happy with the results, please do another search
Threat and Vulnerability Roundup for the week of October 29th to November 4th
Hey there, welcome to Cyber Writes' weekly publication - the Threat and Vulnerability Roundup! Get ready to dive into the latest and greatest in...
Threat and Vulnerability Roundup for the week of August 20th to 26th
Welcome to the Threat and Vulnerability Roundup, a weekly publication from Cyber Writes that provides the most recent news on cybersecurity. Use our wide...
New Chrome Feature Alerts Users About Malicious Extensions
Chrome has released an announcement about its version 117, in which a new feature has been introduced regarding removed extensions from the Chrome web...
Google Chrome Security Update – Multiple High-Severity Vulnerabilities Patched
In a security update for Chrome, Google has updated the Stable and Extended stable channels to 116.0.5845.110 for Mac and Linux and 116.0.5845.110/.111 for Windows....
Threat and Vulnerability Roundup for the week of August 13th to 19th
Welcome to Cyber Writes' weekly Threat and Vulnerability Roundup, where we provide the most recent information on cybersecurity news. Take advantage of our extensive...
Cyber Criminals Turned Mac Systems into Proxy Exit Nodes
Besides Windows OS, now threat actors are also actively targeting Mac systems to accomplish their illicit goals. Cybersecurity analysts at AT&T Alien Labs recently...
Threat and Vulnerability Roundup for the week of August 6th to 12th
Join us at Cyber Writes for our weekly Threat and Vulnerability Roundup, where we provide the latest updates on cybersecurity news. Keep yourself informed...
Threat and Vulnerability Roundup for the week of July 30th to August 5th
The Threat and Vulnerability Roundup for this week is out! With great pride, Cyber Writes presents a weekly overview of the most recent cybersecurity...
Hackers Leverages Teams Chat to Steal Credentials from a Targeted Organization
Microsoft Threat intelligence identifies Midnight Blizzard (previously tracked as NOBELIUM) as a highly targeted social engineering attack.
The attacker uses compromised Microsoft 365 tenants owned...
Hackers Use Google AMP Pages to Bypass Enterprise Email Security Measures
A new phishing tactic was discovered that takes advantage of Google Accelerated Mobile Pages (AMP), which is known to be successful in bypassing email...