News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Frightening: Cyber ​​attack via stolen GPU pixels in the browser 
B2B Cyber ​​Security ShortNews

Cyber ​​attack: Researchers stole the cached, compressed GPU graphics data values ​​from a browser using side channel analysis, reconstructed them using machine learning (ML), and thus obtained website login data and other sensitive data. How the whole thing works sounds shockingly simple - but you can also protect yourself! In a research paper, researchers from Austin Texas, Carnegie Mellon, Washington and Illinois Urbana-Champaign universities present a method for carrying out a side-channel attack on graphics card GPUs that can be used to obtain sensitive information from running programs. This “pixel theft” and their values ​​– artifacts –…

Read more

Microsoft Teams: Open gateway for cybercriminals
Microsoft Teams: Open gateway for cybercriminals

Many authorities and companies use Microsoft products, the Microsoft Office product range with teams in particular is very popular, also in the cloud version. As Proofpoint's security experts have shown in the past, this cloud migration brings new cyber risks, such as phishing, stolen logins and identities. Attackers are currently increasingly targeting cloud environments and services and trying to exploit existing security gaps and vulnerabilities for their own purposes. In recent months and years, cybercriminals have used Microsoft services for attacks and, for example, effectively used Microsoft Sway as a weapon, bypassing security measures. Many…

Read more

Phishing: Two million attacks via HTML files
Phishing: Two million attacks via HTML files

Kaspersky experts warn of the growing threat of phishing emails containing HTML files. From January to April 2022, Kaspersky blocked almost two million phishing emails with such attachments. Using HTML files in phishing messages is one of the latest and most popular tricks used by scammers. Usually, such links are easily detected by anti-spam engines or anti-virus software, however, using HTML attachments has allowed cyber criminals to avoid detection. HTML Phishing Approaches Many users are unaware that files in phishing emails can be insecure, so they often open malicious HTML attachments unknowingly. Cybercriminals design…

Read more