search

LEMON BLOG

Microsoft Office Remote Code Execution Flaws: What You Need to Know

Cybersecurity | 18 August 2025
A Wake-Up Call for Office Users - Microsoft Office has long been one of the most widely used productivity suites in the world, powering everything from business reports to academic papers. But its popularity also makes it a prime target for attackers. On August 14, 2025, Microsoft disclosed and patched three critical vulnerabilities in Office that could allow remote code execution (RCE)—in other words, attackers running their own malicious code on your computer.

Windows BitLocker Encryption Bypass: What You Need to Know

Cybersecurity | 18 August 2025
A Big Shock for Windows Security - For years, Microsoft's BitLocker encryption has been seen as one of the strongest built-in protections against data theft. Whether on a corporate laptop or a personal device, BitLocker promised that even if someone stole your computer, your files would remain locked away behind layers of encryption.

WinRAR Flaw Allows Malware to Run at Windows Startup

Cybersecurity | 12 August 2025
For decades, WinRAR has been the go-to software for opening and creating RAR files. Even though Windows 11 now natively supports the RAR format — removing the need for most people to install third-party archiving tools — millions of users worldwide still rely on WinRAR, often out of habit or for its extra features. But if you're one of them, you'll want to pay attention: a recently discovered security flaw is being actively exploited, and it could allow hackers to run malware on your PC as soon as Windows starts.

Malaysia Blocks Over 2.1 Billion Scam Calls and Messages Since 2022

Cybersecurity | 08 August 2025
A Growing Threat That Shows No Signs of Slowing -  Online scams in Malaysia have been on the rise, and the numbers are staggering. Since 2022, authorities have managed to block more than 2.1 billion suspicious calls and unsolicited SMS messages—a figure that really drives home just how relentless scammers can be.

Critical Vulnerabilities Found in SonicWall Appliances: What You Need to Know

Cybersecurity | 06 August 2025
Security researchers have uncovered multiple severe vulnerabilities affecting SonicWall's SMA100 series appliances, sending a wave of concern through IT and cybersecurity teams worldwide. These flaws—ranging from buffer overflows to cross-site scripting (XSS)—can be exploited even before a user logs in, making them particularly dangerous.

Government Cyber Breach Claims Under Investigation: What You Need to Know

Cybersecurity | 06 August 2025
Over the weekend, chatter in a hacker forum sparked concern across Malaysia's cybersecurity landscape. A user reportedly claimed to have breached over a dozen Malaysian government websites—offering live system access and sensitive data for sale. The asking price? A hefty USD 20,000 (roughly RM85,500), with Monero cryptocurrency as the preferred method of payment. Naturally, this raised more than a few eyebrows, and authorities were quick to respond.

Malaysia’s Automotive Sector Faces Alarming Cybersecurity Threats, Experts Warn

Cybersecurity | 31 July 2025
As cars become smarter and more connected, Malaysia's booming automotive industry is facing growing cybersecurity risks that can no longer be ignored. According to a new report from Ensign Infosecurity, vulnerabilities within vehicle software and the wider automotive ecosystem are opening doors for cybercriminals—and the potential consequences stretch far beyond the roads.

Microsoft Plans to Take Xbox Age Verification Global, Starting with the UK

Cybersecurity | 30 July 2025
From Porn to Play: The Ripple Effect of the UK's Online Safety Act - The UK's newly enforced Online Safety Act is already making waves across the internet. Initially aimed at clamping down on underage access to adult content, the law requires users to verify their age before accessing pornographic websites. But its impact isn't stopping there. Microsoft, in a move that may surprise some, is aligning with the act—by introducing similar age verification measures for its Xbox gaming platform.

UK Enforces Mandatory Age Verification for Online Pornography Access

Cybersecurity | 29 July 2025
The United Kingdom has introduced a stringent new regulation under the Online Safety Act, aimed at safeguarding minors from exposure to explicit adult content. Effective from last week, any individual attempting to access pornographic material online in the UK must now verify their age through one of two methods: by uploading a selfie for facial age estimation, or by submitting an official photo ID.

Beware of RM100 SARA Scam Links: What You Need to Know

Cybersecurity | 27 July 2025
As Malaysians anticipate the upcoming RM100 one-off cash assistance under the Sumbangan Asas Rahmah (SARA) initiative, the Ministry of Finance (MOF) has issued a firm warning to the public: do not fall for fake registration websites and scam messages. This timely alert comes as fraudulent links have begun making the rounds online, tricking people into providing personal details under the guise of claiming the aid.

Singapore's Military Steps In Amid Rising Cyber Threat: A Closer Look at the Latest Attack

Cybersecurity | 23 July 2025
In an increasingly digital world, even a nation as tech-savvy as Singapore is not immune to cyber threats. On July 19, Singapore's Defence Minister Chan Chun Sing revealed that select military units have been deployed to assist in combating an ongoing cyberattack targeting the country's critical infrastructure. The revelation underscores the growing complexity of modern threats and the importance of a unified national response.

LEMON VIDEO CHANNELS

Step into a world where web design & development, gaming & retro gaming, and guitar covers & shredding collide! Whether you're looking for expert web development insights, nostalgic arcade action, or electrifying guitar solos, this is the place for you. Now also featuring content on TikTok, we’re bringing creativity, music, and tech straight to your screen. Subscribe and join the ride—because the future is bold, fun, and full of possibilities!

My TikTok Video Collection
Subscribe to our Blog
Get notified when there's new article
Subscribe