According to Google, the majority of zero-day vulnerabilities it uncovers are attributed to spyware vendors.

Google’s Threat Analysis Group (TAG) found that in 2023, 80% of the zero-day vulnerabilities they discovered were linked to commercial spyware vendors (CSVs), which exploit these vulnerabilities to conduct surveillance on devices worldwide. Zero-day vulnerabilities are security weaknesses unknown to the software vendors or lacking available fixes. Google’s TAG closely monitors 40 CSVs to detect…

Read More

Google Analytics 4 introduces fresh dimensions to enhance the measurement of both paid and organic traffic

The latest update to Google Analytics 4 brings valuable enhancements to traffic source insights, encompassing both paid and organic channels, thus presenting users with greater opportunities for optimization. Google Analytics 4 has introduced eight new dimensions tailored for tracking and analyzing paid and organic traffic sources: Manual source. Manual medium. Manual source / medium. Manual…

Read More

Mark Zuckerberg’s financial investment in metaverse continues to drain his resources

Meta, formerly known as Facebook, has been experiencing significant financial losses in its endeavors to develop the metaverse. Over the years, the company, under CEO Mark Zuckerberg’s leadership, has poured billions of dollars into its Reality Labs division, focusing on creating virtual reality (VR) technology and experiences. Between 2019 and 2022, Meta spent a staggering…

Read More

The ten passwords most frequently utilized and easily susceptible to being cracked

When considering the most obvious default password choices, what typically comes to mind? Perhaps “Admin1” or “Password1”? Think about what your overly trusting Nan might use for her Hotmail account. The Cybernews Investigation Team has recently unveiled the “most used” passwords that are still in circulation, and some of them are surprisingly outdated. It appears…

Read More

Raspberry Robin malware has advanced, gaining access to Windows exploits ahead of schedule

Recent iterations of Raspberry Robin malware have become more covert, integrating one-day exploits that are selectively deployed on vulnerable systems. One-day exploits exploit vulnerabilities in software that have been recently patched by developers but remain unaddressed on some systems. Threat actors swiftly develop exploits once vulnerabilities are disclosed to exploit them before widespread patch deployment….

Read More