News
September 28, 2024 • 1 min read • Hackernews
Crypto Scam App Disguised as WalletConnect Steals 70K in Five-Month Campaign
Cybersecurity researchers have discovered a malicious Android app on the Google Play Store that enabled the threat actors behind it to steal approximately $70,000 in cryptocurrency from victims over a period of nearly five months. The dodgy app, identified by Check Point, masqueraded as the legitimate WalletConnect open-source protocol to trick
September 28, 2024 • 1 min read • Hackernews
US Charges Three Iranian Nationals for Election Interference and Cybercrimes
U.S. federal prosecutors on Friday unsealed criminal charges against three Iranian nationals who are allegedly employed with the Islamic Revolutionary Guard Corps (IRGC) for their targeting of current and former officials to steal sensitive data. The Department of Justice (DoJ) accused Masoud Jalili, 36, Seyyed Ali Aghamiri, 34, and Yasar (Yaser)
September 27, 2024 • 2 min read • theVerge
Arc browser adds security bulletins and bug bounties
September 27, 2024 • 2 min read • theVerge
The DOJ indicts Iranians for alleged Trump campaign hack-and-leak scheme
September 27, 2024 • 5 min read • theVerge
Microsofts more secure Windows Recall feature can also be uninstalled by users
September 27, 2024 • 1 min read • Hackernews
Progress Software Releases Patches for 6 Flaws in WhatsUp Gold Patch Now
Progress Software has released another round of updates to address six security flaws in WhatsUp Gold, including two critical vulnerabilities. The issues, the company said, have been resolved in version 24.0.1 released on September 20, 2024. The company has yet to release any details about what the flaws are other than
September 27, 2024 • 2 min read • theVerge
Now searches on Google Flights will suggest Amtrak train rides too
September 27, 2024 • 1 min read • Hackernews
Critical Linux CUPS Printing System Flaws Could Allow Remote Command Execution
A new set of security vulnerabilities has been disclosed in the OpenPrinting Common Unix Printing System (CUPS) on Linux systems that could permit remote command execution under certain conditions. A remote unauthenticated attacker can silently replace existing printers (or install new ones) IPP urls with a malicious one, resulting in arbitrary
September 27, 2024 • 1 min read • Hackernews
How to Plan and Prepare for Penetration Testing
As security technology and threat awareness among organizations improves so do the adversaries who are adopting and relying on new techniques to maximize speed and impact while evading detection. Ransomware and malware continue to be the method of choice by big game hunting (BGH) cyber criminals, and the increased use of
September 27, 2024 • 1 min read • Hackernews
Microsoft Identifies Storm-0501 as Major Threat in Hybrid Cloud Ransomware Attacks
The threat actor known as Storm-0501 has targeted government, manufacturing, transportation, and law enforcement sectors in the U.S. to stage ransomware attacks. The multi-stage attack campaign is designed to compromise hybrid cloud environments and perform lateral movement from on-premises to cloud environment, ultimately resulting in data exfiltration, credential theft, tampering, persistent
September 27, 2024 • 2 min read • theVerge
Gemini is making Gmails smart replies smarter
September 27, 2024 • 1 min read • Hackernews
Cybersecurity Certifications The Gateway to Career Advancement
In todays fast-evolving digital landscape, cybersecurity has become a cornerstone of organizational resilience. As cyber threats grow increasingly sophisticated, the demand for skilled cybersecurity professionals has never been higher. Whether youre a seasoned cyber professional or just starting your journey, signing up for the GIAC Newsletter ensures youre always informed
September 27, 2024 • 1 min read • Hackernews
New HTML Smuggling Campaign Delivers DCRat Malware to Russian-Speaking Users
Russian-speaking users have been targeted as part of a new campaign distributing a commodity trojan called DCRat (aka DarkCrystal RAT) by means of a technique known as HTML smuggling. The development marks the first time the malware has been deployed using this method, a departure from previously observed delivery vectors such
September 27, 2024 • 1 min read • Hackernews
US Sanctions Two Crypto Exchanges for Facilitating Cybercrime and Money Laundering
The U.S. government on Thursday sanctioned two cryptocurrency exchanges and unsealed an indictment against a Russian national for his alleged involvement in the operation of several money laundering services that were offered to cybercriminals. The virtual currency exchanges, Cryptex and PM2BTC, have been alleged to facilitate the laundering of cryptocurrencies possibly
September 27, 2024 • 1 min read • Hackernews
Critical NVIDIA Container Toolkit Vulnerability Could Grant Full Host Access to Attackers
A critical security flaw has been disclosed in the NVIDIA Container Toolkit that, if successfully exploited, could allow threat actors to break out of the confines of a container and gain full access to the underlying host. The vulnerability, tracked as CVE-2024-0132, carries a CVSS score of 9.0 out of a
September 26, 2024 • 11 min read • theVerge
The best smartphone you can buy for under 500
September 26, 2024 • 18 min read • theVerge
The best Xbox controller to buy right now
September 26, 2024 • 2 min read • theVerge
Googles NotebookLM can help you dive deeper into YouTube videos
September 26, 2024 • 16 min read • theVerge
The best phone to buy right now
September 26, 2024 • 2 min read • theVerge
Googles new Nest Learning Thermostat is discounted for the first time
September 26, 2024 • 1 min read • Hackernews
Hackers Could Have Remotely Controlled Kia Cars Using Only License Plates
Cybersecurity researchers have disclosed a set of now patched vulnerabilities in Kia vehicles that, if successfully exploited, could have allowed remote control over key functions simply by using only a license plate. These attacks could be executed remotely on any hardware-equipped vehicle in about 30 seconds, regardless of whether it had
September 26, 2024 • 4 min read • theVerge
Google says a closed ad ecosystem isnt anticompetitive its just safer
September 26, 2024 • 1 min read • Hackernews
N Korean Hackers Deploy New KLogEXE and FPSpy Malware in Targeted Attacks
Threat actors with ties to North Korea have been observed leveraging two new malware strains dubbed KLogEXE and FPSpy. The activity has been attributed to an adversary tracked as Kimsuky, which is also known as APT43, ARCHIPELAGO, Black Banshee, Emerald Sleet (formerly Thallium), Sparkling Pisces, Springtail, and Velvet Chollima. These samples enhance
September 26, 2024 • 1 min read • Hackernews
Overloaded with SIEM Alerts Discover Effective Strategies in This Expert-Led Webinar
Imagine trying to find a needle in a haystack, but the haystack is on fire, and there are a million other needles you also need to find. Thats what dealing with security alerts can feel like. SIEM was supposed to make this easier, but somewhere along the way, it became part
September 26, 2024 • 2 min read • theVerge
Google Maps is cracking down on fake reviews
September 26, 2024 • 1 min read • Hackernews
EPSS vs CVSS Whats the Best Approach to Vulnerability Prioritization
Many businesses rely on the Common Vulnerability Scoring System (CVSS) to assess the severity of vulnerabilities for prioritization. While these scores provide some insight into the potential impact of a vulnerability, they don’t factor in real-world threat data, such as the likelihood of exploitation. With new vulnerabilities discovered daily, teams
September 26, 2024 • 1 min read • Hackernews
Watering Hole Attack on Kurdish Sites Distributing Malicious APKs and Spyware
As many as 25 websites linked to the Kurdish minority have been compromised as part of a watering hole attack designed to harvest sensitive information for over a year and a half. French cybersecurity firm Sekoia, which disclosed details of the campaign dubbed SilentSelfie, described the intrusion set as long-running, with
September 26, 2024 • 1 min read • Hackernews
Cloudflare Warns of India-Linked Hackers Targeting South and East Asian Entities
An advanced threat actor with an India nexus has been observed using multiple cloud service providers to facilitate credential harvesting, malware delivery, and command-and-control (C2). Web infrastructure and security company Cloudflare is tracking the activity under the name SloppyLemming, which is also called Outrider Tiger and Fishing Elephant. Between late 2022 to
September 26, 2024 • 1 min read • Hackernews
Chinese Hackers Infiltrate US Internet Providers in Cyber Espionage Campaign
Nation-state threat actors backed by Beijing broke into a handful of U.S. internet service providers (ISPs) as part of a cyber espionage campaign orchestrated to glean sensitive information, The Wall Street Journal reported Wednesday. The activity has been attributed to a threat actor that Microsoft tracks as Salt Typhoon, which is
September 26, 2024 • 4 min read • theVerge
SteelSeries is launching 160 gaming earbuds for your Xbox PlayStation or PC
September 25, 2024 • 6 min read • theVerge
Google Pixel Buds Pro 2 review big upgrade much smaller earbuds
September 25, 2024 • 1 min read • Hackernews
Googles Shift to Rust Programming Cuts Android Memory Vulnerabilities by 68
Google has revealed that its transition to memory-safe languages such as Rust as part of its secure-by-design approach has led to the percentage of memory-safe vulnerabilities discovered in Android dropping from 76% to 24% over a period of six years. The tech giant said focusing on Safe Coding for new features
September 25, 2024 • 3 min read • theVerge
Microsoft is moving Game Pass into a single Xbox mobile app
September 25, 2024 • 3 min read • theVerge
Google files EU antitrust complaint over Microsofts cloud practices
September 25, 2024 • 1 min read • Hackernews
Mozilla Faces Privacy Complaint for Enabling Tracking in Firefox Without User Consent
Vienna-based privacy non-profit noyb (short for None Of Your Business) has filed a complaint with the Austrian data protection authority (DPA) against Firefox maker Mozilla for enabling a new feature called Privacy-Preserving Attribution (PPA) without explicitly seeking users consent. Contrary to its reassuring name, this technology allows Firefox to track user
September 25, 2024 • 2 min read • theVerge
Raycast is bringing its superpowerful Mac launcher to iOS and Windows
September 25, 2024 • 1 min read • Hackernews
Cybersecurity Researchers Warn of New Rust-Based Splinter Post-Exploitation Tool
Cybersecurity researchers have flagged the discovery of a new post-exploitation red team tool called Splinter in the wild. Palo Alto Networks Unit 42 shared its findings after it discovered the program on several customers systems. It has a standard set of features commonly found in penetration testing tools and its developer created
September 25, 2024 • 1 min read • Hackernews
ChatGPT macOS Flaw Couldve Enabled Long-Term Spyware via Memory Function
A now-patched security vulnerability in OpenAIs ChatGPT app for macOS could have made it possible for attackers to plant long-term persistent spyware into the artificial intelligence (AI) tools memory. The technique, dubbed SpAIware, could be abused to facilitate continuous data exfiltration of any information the user typed or responses received by
September 25, 2024 • 1 min read • Hackernews
Expert Tips on How to Spot a Phishing Link
Phishing attacks are becoming more advanced and harder to detect, but there are still telltale signs that can help you spot them before its too late. See these key indicators that security experts use to identify phishing links1. Check Suspicious URLs Phishing URLs are often long, confusing, or filled with random
September 25, 2024 • 1 min read • Hackernews
Agentic AI in SOCs A Solution to SOARs Unfulfilled Promises
Security Orchestration, Automation, and Response (SOAR) was introduced with the promise of revolutionizing Security Operations Centers (SOCs) through automation, reducing manual workloads and enhancing efficiency. However, despite three generations of technology and 10 years of advancements, SOAR hasn’t fully delivered on its potential, leaving SOCs still grappling with many of
September 25, 2024 • 1 min read • Hackernews
Transportation Companies Hit by Cyberattacks Using Lumma Stealer and NetSupport Malware
Transportation and logistics companies in North America are the target of a new phishing campaign that delivers a variety of information stealers and remote access trojans (RATs). The activity cluster, per Proofpoint, makes use of compromised legitimate email accounts belonging to transportation and shipping companies so as to inject malicious content
September 25, 2024 • 1 min read • Hackernews
CISA Flags Critical Ivanti vTM Vulnerability Amid Active Exploitation Concerns
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a critical security flaw impacting Ivanti Virtual Traffic Manager (vTM) to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The vulnerability in question is CVE-2024-7593 (CVSS score 9.8), which could be exploited by a remote unauthenticated
September 24, 2024 • 2 min read • theVerge
Microsoft claims its AI safety tool not only finds errors but also fixes them
September 24, 2024 • 1 min read • Hackernews
Necro Android Malware Found in Popular Camera and Browser Apps on Play Store
Altered versions of legitimate Android apps associated with Spotify, WhatsApp, and Minecraft have been used to deliver a new version of a known malware loader called Necro. Kaspersky said some of the malicious apps have also been found on the Google Play Store. They have been cumulatively downloaded 11 million times.
September 24, 2024 • 2 min read • theVerge
New Xbox Design Lab translucent Elite controller options are clearly great
September 24, 2024 • 1 min read • Hackernews
US Proposes Ban on Connected Vehicles Using Chinese and Russian Tech
The U.S. Department of Commerce (DoC) said its proposing a ban on the import or sale of connected vehicles that integrate software and hardware made by foreign adversaries, particularly that of the Peoples Republic of China (PRC) and Russia. The proposed rule focuses on hardware and software integrated into the Vehicle
September 24, 2024 • 1 min read • Hackernews
Discover Latest Ransomware Tactics and Zero Trust Strategies in This Expert Webinar
Ransomware is no longer just a threat; its an entire industry. Cybercriminals are growing more sophisticated, and their tactics are evolving rapidly. This persistent danger is a major concern for business leaders. But theres good news you dont have to be defenseless. What if you could gain a strategic edge? Join our exclusive
September 24, 2024 • 1 min read • Hackernews
Kaspersky Exits US Automatically Replaces Software With UltraAV Raising Concerns
Antivirus vendor Kaspersky has formally begun pulling back its offerings in the U.S., migrating existing users to UltraAV, effective September 19, 2024, ahead of its formal exit at the end of the month. Kaspersky antivirus customers received a software update facilitating the transition to UltraAV, the company said in a post
September 24, 2024 • 1 min read • Hackernews
The SSPM Justification Kit
SaaS applications contain a wealth of sensitive data and are central to business operations. Despite this, far too many organizations rely on half measures and hope their SaaS stack will remain secure. Unfortunately, this approach is lacking and will leave security teams blind to threat prevention and detection, as well
September 24, 2024 • 1 min read • Hackernews
New Octo2 Android Banking Trojan Emerges with Device Takeover Capabilities
Cybersecurity researchers have discovered a new version of an Android banking trojan called Octo that comes with improved capabilities to conduct device takeover (DTO) and perform fraudulent transactions. The new version has been codenamed Octo2 by the malware author, Dutch security firm ThreatFabric said in a report shared with The Hacker