Blog

This Android Malware Is Stealing Login Credentials

If you're deeply involved in IT security, you may already be familiar with the ERMAC Android banking trojan. If this is the first time you're hearing of it, be aware that the ...

Screencastify Issue Could Allow Someone To Steal Recorded Videos

Are you one of the legions of users making use of the Screencastify Chrome extension?  It's a fantastic Chrome extension that allows you to almost effortlessly create screencasts for a variety of ...

Update Google Chrome Soon To Fix Multiple Security Issues

Are you a Google Chrome user?  If so, be aware that the company recently released a stable version of Chrome 102 and is urging all users of its browser to update right ...

General Motors Customer Data Leaked By Credential Stuffing Attacks

Do you own a Chevrolet, Buick, GMC, or Cadillac?  If so, be aware that GM recently acknowledged that they fell victim to a credential stuffing attack a little over a month ago. ...

Be Aware That ChromeLoader Malware Is Picking Up Steam

A browser hijacker called "ChromeLoader" has had a large uptick in detections this month, which is raising eyebrows among security professionals. ChromeLoader can modify a victim's web browser settings to show search ...

 New Phishing Attacks Use HTML Email Attachments

HTML attachments as an attack vector may seem a little old school. However, according to statistics compiled by Kaspersky Lab indicates that in 2022, that form of attack is not just simply ...

Upgrade This WordPress Plugin To Avoid Being Hacked

Do you own and manage a WordPress site either personally or as part of your business?  Do you also use the Tatsu plugin which offers a powerful suite of in-browser editing features ...

Update Addresses Zero Day Exploit For Some Apple Devices

If you're not familiar with the term, a Zero Day exploit is a security flaw that the software vendor is not aware of and hasn't yet patched. In many (but not all) ...

New Phishing Attack Delivers Three Types Of Malware To Victims

Phishing campaigns get more effective the more closely they can imitate a trusted source.  Recently, security researchers at Fortinet discovered evidence of a phishing campaign that specifically targets Microsoft Windows users and ...

Update Zyxel Products To Fix Possible Security Vulnerability

Do you use a Zyxel firewall?  If so, there's good news.  The company has fixed an issue you may not have even been aware that you had. The company pushed out the ...

Contact

Wild Frog ConsultingWild Frog Consulting Logo $$$

Social Media