New Malvertising Campaign Distributing PikaBot Disguised as Popular Software

The malware loader known as PikaBot is being distributed as part of a malvertising campaign targeting users searching for legitimate software like AnyDesk. “PikaBot was previously only distributed via malspam campaigns similarly to QakBot and emerged as one of the preferred payloads for a threat actor known as TA577,” Malwarebytes’ Jérôme Segura said. The malware family, which first appeared in early 2023, consists of a loader and a core module that allows it to operate as a […]

read more

When Windows 10 support runs out, you have 5 options

When Windows 10 support runs out, you have 5 options but only 2 are worth considering Microsoft will officially end support for its most popular operating system in October 2025. Here’s what you should do with your Windows 10 PCs before that day arrives. Written by Ed Bott, Senior Contributing EditorDec. 18, 2023 at 1:49 a.m. PT In less than two years, Microsoft will draw the final curtain on Windows 10 after a successful […]

read more

LogoFAIL exploit bypasses hardware and software security measures and is nearly impossible to detect or remove

By Roshan Ashraf Shaikh Computers running Windows or Linux are vulnerable to a new type of firmware attack called LogoFAIL, according to a report from Ars Technica. This attack has proven to be extremely effective because it rewrites the logo that typically appears when the system boots after a successful POST (hence the name, “LogoFAIL”), which is early enough that it can bypass security measures designed to prevent bootkit attacks. The issue affects any […]

read more

New Bluetooth Flaw Let Hackers Take Over Android, Linux, macOS, and iOS Devices

A critical new bluetooth flaw could be exploited by threat actors to take control of Android, Linux, macOS and iOS devices. Tracked as CVE-2023-45866, the issue relates to a case of authentication bypass that enables attackers to connect to susceptible devices and inject keystrokes to achieve code execution as the victim. “Multiple Bluetooth stacks have authentication bypass vulnerabilities that permit an attacker to connect to a discoverable host without user confirmation […]

read more

50K WordPress sites exposed to RCE attacks by critical bug in backup plugin

By: SERGIU GATLAN. A critical severity vulnerability in a WordPress plugin with more than 90,000 installs can let attackers gain remote code execution to fully compromise vulnerable websites. Known as Backup Migration, the plugin helps admins automate site backups to local storage or a Google Drive account. The security bug (tracked as CVE-2023-6553 and rated with a 9.8/10 severity score) was discovered by a team of bug hunters known as Nex Team, who reported it to […]

read more
Trustpilot
The rating of livingsafeonline.com at Trustprofile Reviews is 9.1/10 based on 13 reviews.
A note to our visitors

This website has updated its privacy policy in compliance with changes to European Union data protection law, for all members globally. We’ve also updated our Privacy Policy to give you more information about your rights and responsibilities with respect to your privacy and personal information. Please read this to review the updates about which cookies we use and what information we collect on our site. By continuing to use this site, you are agreeing to our updated privacy policy.