Fake WinRAR PoC spread VenomRAT malware
An unknown threat actor has released a fake proof of concept (PoC) exploit for CVE-2023-4047, a recently fixed remote code execution (RCE) vulnerability in WinRAR, to spread the VenomRAT malware. The fake WinRAR PoC On August 17, 2023, Trend Micro.....»»
Nonnative plants are a major force behind global insect invasions, study finds
In an article in the journal BioScience, an international team of researchers led by Dr. Cleo Bertelsmeier from the University of Lausanne, Switzerland, argues that the global spread of nonnative plants is a key factor driving the growing number of i.....»»
Israeli orgs targeted with wiper malware via ESET-branded emails
Attackers have tried to deliver wiper malware to employees at organizations across Israel by impersonating cybersecurity company ESET via email. The phishing email The attack took the form of a phishing email ostensibly sent by the “Eset Advanc.....»»
Feds test whether existing laws can combat surge in fake AI child sex images
Kids defenseless against AI-generated sex images as feds expand crackdown. Cops aren't sure how to protect kids from an ever-escalating rise in fake child sex abuse imagery fueled.....»»
Fake Google Meet pages deliver infostealers
Users of the Google Meet video communication service have been targeted by cyber crooks using the ClickFix tactic to infect them with information-stealing malware. Fake Google Meet video conference page with malicious ClickFix pop-up (Source: Sekoia).....»»
How the invasive spiny water flea spread across Canada, and what we can do about it
Across the tranquil waters of Canada's vast network of lakes and rivers, a quiet invader is on the move. The spiny water flea, Bythotrephes cederströmii, is a microscopic predator that is forever altering the ecological fabric of aquatic habitats in.....»»
Are you tasty to mosquitoes? Study offers clues into when and why they bite
As mosquitoes and mosquito-borne illnesses like dengue fever spread across the world, researchers say that a key strategy to prevent these illnesses may be dissuading the insects from biting their victims in the first place. But while scientists have.....»»
Study explores how children engage with dual-language books
Dual-language books (DLBs) are ones with the story told in two languages—sometimes with both languages on the same page, and other times in a two-page spread with the first language on one page and the second language on the other......»»
Why Disasters Like Hurricanes Milton and Helene Unleash So Much Misinformation
Falsehoods spread when uncertainties—and emotions—are high after hurricanes.....»»
ExtraHop RevealX enhancements accelerate investigation workflows
ExtraHop unveiled new network-based file analysis capabilities in ExtraHop RevealX to detect malware, combat ransomware, and help prevent data loss. According to the 2024 Global Ransomware Trends Report, organizations experience an average of eight r.....»»
Deepfake lovers swindle victims out of $46M in Hong Kong AI scam
Scammers used AI deepfake tools to create fake online personas, tricking victims in video calls. On Monday, Hong Kong police announced the arrest of 27 people involved in a romanc.....»»
North Korean hackers use newly discovered Linux malware to raid ATMs
Once, FASTCash ran only on Unix. Then came Windows. Now it can target Linux, too. In the beginning, North Korean hackers compromised the banking infrastructure running AIX, IBM’.....»»
Spotify criticized for letting fake albums appear on real artist pages
Real bands struggle to remove fake albums from their Spotify pages. This fall, thousands of fake albums were added to Spotify, with some appearing on real artist pages, where they.....»»
Expert witness used Copilot to make up fake damages, irking judge
Judge calls for a swift end to experts secretly using AI to sway cases. A New York judge recently called out an expert witness for using Microsoft's Copilot chatbot to inaccuratel.....»»
AI affects everyone—including Indigenous people
Since artificial intelligence (AI) became mainstream over the past two years, many of the risks it poses have been widely documented. As well as fueling deep fake porn, threatening personal privacy and accelerating the climate crisis, some people bel.....»»
Using ChatGPT to make fake social media posts backfires on bad actors
OpenAI claims cyber threats are easier to detect when attackers use ChatGPT. Using ChatGPT to research cyber threats has backfired on bad actors, OpenAI revealed in a report analy.....»»
Actively exploited Firefox zero-day fixed, update ASAP! (CVE-2024-9680)
Mozilla has pushed out an emergency update for its Firefox and Firefox ESR browsers to fix a vulnerability (CVE-2024-9680) that is being exploited in the wild. About CVE-2024-9680 Reported by ESET malware researcher Damien Schaeffer, CVE-2024-9680 is.....»»
Widening talent pool in cyber with on-demand contractors
Filling roles within the cyber sector is an ongoing battle. The shortfall of workers risks creating a vicious cycle within existing cyber teams: With fewer team members to spread the workload on, you risk burning out security professionals. Many make.....»»
Study reveals how parasites thrive by balancing specialization with exploiting diverse species communities
A single shift of a parasite from one host species to another can trigger catastrophic infectious disease outbreaks. Despite this, scientists continue to debate the role of species diversity in natural environments on the spread of these parasites......»»
Asteroid that wiped out the dinosaurs may have led to the invention of "ant agriculture"
The event that wiped out the dinosaurs wasn't all bad. The low-light environment caused by the meteor impact some 66 million years ago favored the spread of fungi that feed on organic matter, which was abundant at the time as plants and animals were.....»»
Apple couldn’t tell fake iPhones from real ones, lost $2.5M to scammers
Repair scheme got Apple to replace 6K fake iPhones with real ones. Two men involved in an elaborate scheme duping Apple into replacing about 6,000 counterfeit iPhones with genuine.....»»