Jump to content

Information Security

New Chrome Vulnerability Could Let Hackers Escape Browser Security – What You Need to Know A newly discovered security flaw in Google Chrome is drawing serious attention from cybersecurity experts around the world, and Nigerians using Chrome browsers are advised to take immediate action by updating their browsers. The issue, discovered in the browser's graphics handling system, has already been exploited by attackers online—making it a real threat to users. The flaw is associated with Chrome's r
🚨Major Security Risk: Attackers Exploit Cisco Software Used in Company Networks A new warning has been issued for businesses and organizations using Cisco's Identity Services Engine (ISE). Security experts have discovered that hackers are actively attacking weak spots in this software, and if your system is not updated, attackers could gain full control. What is Cisco ISE? Cisco ISE is a security tool that helps businesses manage who is allowed into their internal computer systems. It checks the
How Hackers Are Exploiting Online Shops and Servers to Earn Illegal Money Cybercriminals are now turning to online store platforms like Magento and server tools such as Docker to secretly make money. These attackers are not just randomly picking their targets — they are skilled, organized, and always searching for new ways to break into websites and systems that are not properly protected. One known group of attackers, who have previously targeted websites built with a system called Craft CMS, h
🛡️ New Malware Tricks Windows Features to Steal Bank Login Details A dangerous computer virus is now using a clever trick on Windows computers to steal people's bank login details. This malware, which researchers are calling Coyote, is specifically targeting users in Brazil but could be a warning for other countries too, including Nigeria. This virus uses a special part of Windows called UI Automation. Normally, this tool helps people with disabilities by allowing screen readers and other progra
How Hackers Are Exploiting SysAid Software Vulnerabilities to Break into IT Systems Security researchers have discovered that attackers are actively targeting weaknesses in a popular IT service management platform called SysAid. These weaknesses, known as XML External Entity (XXE) vulnerabilities, were found in key components of the software and could allow hackers to gain full control of affected systems. SysAid is used by many businesses and organizations to manage help desk tickets, monitor s
How Hackers Are Exploiting SysAid Software Vulnerabilities to Break into IT Systems Security researchers have discovered that attackers are actively targeting weaknesses in a popular IT service management platform called SysAid. These weaknesses, known as XML External Entity (XXE) vulnerabilities, were found in key components of the software and could allow hackers to gain full control of affected systems. SysAid is used by many businesses and organizations to manage help desk tickets, monitor s
Hackers Are Stealing Passwords and Taking Remote Control Using Free Tools — What’s Happening and How They’re Doing It In the past few months, cybersecurity experts have noticed a sharp increase in attacks where hackers steal usernames and passwords, and then take control of people’s or companies’ computers — all without needing fancy or expensive malware. Most of these attacks are happening in Mexico and other parts of Latin America, and they are being carried out by a group called Greedy Sponge
How Hackers Are Breaking Into Big Retail Brands Without Using Malware — And What You Can Learn From It In the past year, some of the world’s most well-known retail brands have fallen victim to cyber attacks. These include Adidas, The North Face, Cartier, Victoria’s Secret, Marks & Spencer, Co-op, and even Dior. What’s shocking is that these attacks didn’t involve high-end malware or advanced hacking tools. Instead, they were identity-based attacks — a growing method where hackers don’t break
Cybersecurity experts have discovered a wave of cyber attacks targeting banks and financial institutions in different parts of Africa. These attacks have been happening since at least July 2023. What’s surprising is that the hackers are not using expensive or custom-made tools. Instead, they are using open-source tools — tools that anyone can download for free from the internet. These hackers are smart. They use tricks to hide what they’re doing and make it look like they’re running normal progr
The UK’s National Crime Agency (NCA) has announced the arrest of four individuals in connection with large-scale cyber attacks that caused significant financial damage to some of the country's most recognized retail brands. The attacks, which reportedly targeted Marks & Spencer, Co-op, and Harrods, are estimated to have caused losses of up to £440 million. The individuals arrested include three young men aged 17, 19, and 19, along with a 20-year-old woman, all apprehended in coordinated oper
Chinese Cyber Espionage Groups Exploit SharePoint Vulnerabilities in Coordinated Attacks, Microsoft Warns Microsoft has issued a new warning about a series of active cyberattacks targeting vulnerable SharePoint Server systems. These attacks have been formally linked to multiple Chinese state-sponsored threat actors, highlighting an urgent security risk to organizations still running unpatched, internet-facing SharePoint deployments. The tech giant confirmed that three advanced persistent threat