Skip to content

Online Gaming Chats Have Long Been Spy Risk for US Military “How to Make the Most of Your Summer Holiday” “Maximizing Your Summer Vacation”

Enter a U.S. military recreation hall at any base around the globe and you’ll likely witness it: youthful soldiers engrossed in the virtual realm of online gaming, utilizing either government-funded gaming equipment or their personal consoles. This avidness for gaming has recently gained attention following the arrest of Jack Teixeira, a 21-year-old member of the… 

Google Proposes More Transparent Vulnerability Management Practices “A Guide to Creating a Successful Online Business” “How to Build a Profitable Digital Enterprise”

Google today published a white paper calling on vendors to provide more transparency into their vulnerability management practices. A longtime supporter of collaboration on bug disclosure and patching, the internet giant believes that the endless ‘doom loop’ of vulnerability patching is exhausting defenders and users. In addition, the tools created in response to novel attack… 

ChatGPT Could Return to Italy if OpenAI Complies With Rules “Navigating the Online Job Market” “Exploring the Digital Job Scene”

ChatGPT, an artificial intelligence (AI) chatbot developed by OpenAI, may be able to make its return to Italy soon. The Italian data protection authority has imposed a temporary ban on the software over privacy worries, and has outlined a set of requirements that OpenAI must satisfy by April 30 for the ban to be lifted.… 

Critical Vulnerability in Hikvision Storage Solutions Exposes Video Security Data “5 Ways to Create a Successful Online Business” “Five Strategies for Building a Profitable Online Venture”

Video surveillance giant Hikvision this week informed customers that it has patched a critical vulnerability affecting its Hybrid SAN and cluster storage products. The vulnerability, tracked as CVE-2023-28808, has been described by the vendor as an access control issue that can be exploited to obtain administrator permissions by sending specially crafted messages to the targeted… 

4.8 Million Impacted by Data Breach at TMX Finance “How to Make Money Online: 10 Tips for Success” “10 Tips for Making Money Online Successfully”

Consumer loan company TMX Finance has recently disclosed a data breach impacting over 4.8 million customers of its services, which include TitleMax (title lending services), TitleBucks (car title loans), and InstaLoan (fast-approval personal loan services). The attack was identified on February 13th, 2023, and the attackers accessed their systems in December 2022. The compromised personal… 

UK Introduces Mass Surveillance With Online Safety Bill “The Impact of Social Media on Mental Health” “Exploring the Relationship Between Social Media and Mental Well-Being”

The Online Safety Bill is a UK law that has passed through the House of Commons and is currently at committee stage in the House of Lords. It is likely that it will become law, and its reach extends to any internet platform providing services to people in the UK. The bill requires platform providers… 

Thousands Access Fake DDoS-for-Hire Websites Set Up by UK Police “The Pros and Cons of Online Shopping” “Exploring the Benefits and Drawbacks of Shopping Online”

The UK’s National Crime Agency (NCA) has been running several fake DDoS-for-hire websites in an effort to gain insight into the cybercrime marketplace and identify individuals engaging in these illicit activities. The websites claim to offer users the ability to launch distributed denial-of-service (DDoS) attacks against a target of their choice. These services, also known… 

Microsoft: No-Interaction Outlook Zero Day Exploited Since Last April “5 Tips for Creating an Effective Online Presence” “How to Build an Engaging Digital Presence”

Microsoft recently disclosed that a Russian-based Advanced Persistent Threat (APT) actor had been exploiting a critical zero-day vulnerability in Outlook since April 2022. The vulnerability, tracked as CVE-2023-23397, leaves few forensic artifacts to discover in traditional endpoint forensic analysis and could be used for initial access, credential access, lateral movement, and persistence in compromised mailboxes.…