• RAR, or WinRAR in its contemporary Windows form, has been popular in file sharing and software distribution circles for…

Is microsoft’s august 2023 patch tuesday really adequate to stop cyberattackers? #exploitation #zeroday
. It’s like putting a band-aid on a broken arm, Microsoft’s August 2023 Patch Tuesday is a small measure to…

a blue firefox moon: upgrading every 28 days#firefox #vulnerabilities
Source: https://nakedsecurity.sophos.com/2023/08/01/firefox-fixes-a-flurry-of-flaws-in-the-first-of-two-releases-this-month/ I’ve summarised this article for you: The latest full version of Firefox is out, and it marks the…

1 billion malware programs: get the lowdown on #cyberthreats #malware
Source: https://www.cshub.com/malware/articles/the-9-most-common-types-of-malware-and-the-worst-malware-attacks-in-history?utm_medium=RSS I’ve summarised this article for you: Malware has been a threat for as long as computers have been…

microsoft patch tuesday: #zerodays #eop exploits & malicious drivers block
Source: https://nakedsecurity.sophos.com/2023/07/12/microsoft-patches-four-zero-days-finally-takes-action-against-crimeware-kernel-drivers/ I’ve summarised this article for you: This month, Microsoft released a patch for more than 100 vulnerabilities, including…

#rootkits with #microsoft: malicious drivers targeting #gaming users in china on the rise
Source: https://www.darkreading.com/attacks-breaches/researchers-discover-microsoft-signed-rootkit-for-loading-2nd-stage-kernel-module I’ve summarised this article for you: It’s outrageous that threat actors are getting away with using sophisticated rootkits…