cyber attacks

Winsage
July 9, 2025
Calne-based Black Nova Designs has warned that Microsoft will cease support for Windows 10 in three months, which will leave millions of users without security updates or technical assistance, increasing their vulnerability to cyber threats. Managing director Kyle Holmes noted the lack of awareness about this change and emphasized the risks involved. The company recommends six IT tips for businesses: 1. Upgrade from Windows 10 promptly, especially for machines older than 2018. 2. Regularly back up data and maintain robust antivirus protection, with services starting at £60+VAT per month. 3. Strengthen passwords to mitigate vulnerabilities. 4. Verify that correct Microsoft licenses are being used to avoid potential fines. 5. Ensure proper ownership and access to website domains. 6. Seek Cyber Essentials certification to demonstrate adherence to cybersecurity best practices. Black Nova Designs supports over 1,000 clients across the UK, focusing on cybersecurity and proactive IT management.
Winsage
April 29, 2025
Microsoft has introduced a no-reboot patching feature for Windows 11 and announced hotpatching costs for Windows Server 2025. Windows 7 and Windows Server 2008 R2 have reached their end-of-support status and lack official security patches. However, users of these legacy systems can utilize a micro patching service called 0patch, which delivers micro patches to address specific vulnerabilities without requiring system reboots. On April 29, 2023, Mitja Kolsek, CEO of ACROS Security, announced that support for Windows 7 and Windows Server 2008 R2 would be extended until January 2027 due to high demand. These micro patches are currently the only available security updates for these legacy versions.
BetaBeacon
April 3, 2025
Google's decision to introduce gaming capabilities in cars through Android Auto has faced criticism from experts who fear it may lead to distractions on the road and make vehicles vulnerable to cyber attacks. Akash Mahajan, CEO of Kloudle, highlighted the increased security risks associated with adding gaming features to cars.
AppWizard
March 31, 2025
Google warns Android users about the risks of downloading apps from sources outside the Google Play Store, noting that such apps are 50 times more likely to contain malware. In 2023, Google removed around 2.3 million suspicious apps from the Play Store and banned over 300 apps that circumvented Android's security measures, which had over 60 million downloads and were involved in deceptive advertising and phishing schemes. Google is enhancing its Play Protect Live Threat Detection system to combat fake and dangerous apps. Recommendations for protecting phones include downloading apps only from the Google Play Store, checking reviews and ratings, installing security updates, and avoiding unknown links.
Tech Optimizer
February 21, 2025
Security researchers have identified a zero-day vulnerability in PostgreSQL, labeled CVE-2025-1094, which is believed to have contributed to the cyber breach of the US Treasury in December. The breach was initially attributed to the command injection vulnerability CVE-2024-12356 in the BeyondTrust Remote Support platform. Successful exploitation of CVE-2024-12356 required prior exploitation of CVE-2025-1094. Although BeyondTrust issued a patch for CVE-2024-12356 in December 2024, it did not resolve the underlying issue of CVE-2025-1094, leaving it a zero-day vulnerability until reported to PostgreSQL. Chinese hackers reportedly gained remote access to multiple workstations within the US Treasury, potentially compromising unclassified documents. The details of the accessed documents and the number of workstations involved are not disclosed. This incident is part of a broader pattern of cyber attacks linked to Chinese state-sponsored actors.
Tech Optimizer
December 10, 2024
Antivirus software is essential for protecting devices from cyber threats, but simply installing it is not enough; outdated software can lead to vulnerabilities. Outdated antivirus systems are less effective against new malware and phishing techniques, limiting their functionality and increasing the risk of data breaches. Cybercriminals often target outdated systems, which are easier to exploit due to their diminished ability to recognize threats. Additionally, technical support for older antivirus versions may become unavailable, leaving systems defenseless. To maximize security, it is crucial to keep antivirus software updated and consider additional security measures like firewalls and two-factor authentication.
Search