Advertisements


Lazarus exploit Log4Shell vulnerability to deliver novel RAT malware

North Korea-backed group Lazarus has been spotted exploiting the Log4Shell vulnerability (CVE-2021-44228) and novel malware written in DLang (i.e., the memory-safe D programming language). “This campaign consists of continued opportunistic targ.....»»

Category: securitySource:  netsecurityDec 12th, 2023

New macOS malware impersonates popular apps then steals your data

Security researchers have discovered new macOS malware that’s built to steal your most sensitive data. Dubbed ‘Cthulhu Stealer,’ the malware targets users by impersonating popular apps so it can harvest your system password, iCloud Keychain pas.....»»

Category: topSource:  marketingvoxRelated NewsAug 23rd, 2024

Evolved and more powerful macOS malware strain sold cheaply to criminals

Researchers have discovered another data-seizing macOS malware, with "Cthulhu Stealer" sold to online criminals for just $500 a month.Cthulhu Stealer in action [Cado Security]The Mac is becoming even more of a target for malware, with warnings surfac.....»»

Category: appleSource:  appleinsiderRelated NewsAug 23rd, 2024

This new Android malware can steal your card details via the NFC chip

Security researchers spot a sophisticated attack that steals people's NFC data and can be used to steal money, and more......»»

Category: topSource:  marketingvoxRelated NewsAug 23rd, 2024

Another critical SolarWinds Web Help Desk bug fixed (CVE-2024-28987)

A week after SolarWinds released a fix for a critical code-injection-to-RCE vulnerability (CVE-2024-28986) in Web Help Desk (WHD), another patch for another critical flaw (CVE-2024-28987) in the company’s IT help desk solution has been pushed o.....»»

Category: securitySource:  netsecurityRelated NewsAug 23rd, 2024

Vulnerability prioritization is only the beginning

To date, most technology solutions focused on vulnerability management have focused on the prioritization of risks. That usually took the shape of some risk-ranking structure displayed in a table with links out to the CVEs and other advisory or threa.....»»

Category: securitySource:  netsecurityRelated NewsAug 23rd, 2024

Critical GitHub Enterprise Server auth bypass flaw fixed (CVE-2024-6800)

A critical vulnerability (CVE-2024-6800) affecting all currently supported versions of GitHub Enterprise Server (GHES) may allow attackers to gain unrestricted access to the instance’s contents. The issue, reported via the GitHub Bug Bounty pro.....»»

Category: securitySource:  netsecurityRelated NewsAug 22nd, 2024

New Chrome zero-day actively exploited, patch quickly! (CVE-2024-7971)

A new Chrome zero-day vulnerability (CVE-2024-7971) exploited by attackers in the wild has been fixed by Google. About CVE-2024-7971 CVE-2024-7971 is a high-severity vulnerability caused by a type confusion weakness in V8, the open-source JavaScript.....»»

Category: securitySource:  netsecurityRelated NewsAug 22nd, 2024

Android malware uses NFC to steal money at ATMs

ESET researchers uncovered NGate malware, which can relay data from victims’ payment cards via a malicious app installed on their Android devices to the attacker’s rooted Android phone. Attack overview (Source: ESET) Unauthorized ATM withdrawals.....»»

Category: securitySource:  netsecurityRelated NewsAug 22nd, 2024

When Will Apple Release iOS 18.1?

Apple’s currently testing two versions of iOS 18. One version is iOS 18.0, the version will arrive alongside the iPhone 16 series. The other is iOS 18.1, the version that will deliver the company’s initial batch of Apple Intelligence feat.....»»

Category: mobileSource:  gottabemobileRelated NewsAug 20th, 2024

0-day in Windows driver exploited by North Korean hackers to deliver rootkit (CVE-2024-38193)

CVE-2024-38193, an actively exploited zero-day that Microsoft patched earlier this month, has been leveraged by North Korean hackers to install a rootkit on targets’ computers, Gen Digital researchers have revealed. About CVE-2024-38193 CVE-202.....»»

Category: securitySource:  netsecurityRelated NewsAug 20th, 2024

Cybercriminals exploit file sharing services to advance phishing attacks

Threat actors use popular file-hosting or e-signature solutions as a disguise to manipulate their targets into revealing private information or downloading malware, according to Abnormal Security. A file-sharing phishing attack is a unique type of ph.....»»

Category: securitySource:  netsecurityRelated NewsAug 20th, 2024

Vulnerability in Microsoft apps allowed hackers to spy on Mac users

A vulnerability found in Microsoft apps for macOS allowed hackers to spy on users. Security researchers from Cisco Talos reported in a blog post how the vulnerability could be exploited by attackers and what Microsoft has been doing to fix the explo.....»»

Category: topSource:  theglobeandmailRelated NewsAug 20th, 2024

Windows 0-day was exploited by North Korea to install advanced rootkit

FudModule rootkit burrows deep into Windows, where it can bypass key security defenses. Enlarge (credit: Getty Images) A Windows zero-day vulnerability recently patched by Microsoft was exploited by hackers working on be.....»»

Category: topSource:  arstechnicaRelated NewsAug 20th, 2024

Australia"s nature is in deep crisis. These three easy steps could give new environmental laws teeth

The Albanese government's environmental reforms are likely to feature prominently on federal parliament's agenda this week. A Senate inquiry into the long-awaited reforms is due to deliver its findings on Monday. Meanwhile, the Coalition is reportedl.....»»

Category: topSource:  physorgRelated NewsAug 19th, 2024

x64dbg: Open-source binary debugger for Windows

x64dbg is an open-source binary debugger for Windows, designed for malware analysis and reverse engineering of executables without access to the source code. It offers a wide range of features and a plugin system, allowing you to customize and extend.....»»

Category: securitySource:  netsecurityRelated NewsAug 19th, 2024

He dreamed of the ultimate boxing game. Now he’s working with champions

Undisputed looks to deliver a meticulously detailed boxing simulator. To test that vision, we watched the real thing with its creator......»»

Category: topSource:  digitaltrendsRelated NewsAug 18th, 2024

Week in review: MS Office flaw may leak NTLM hashes, malicious Chrome, Edge browser extensions

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Unpatched MS Office flaw may leak NTLM hashes to attackers (CVE-2024-38200) A new MS Office zero-day vulnerability (CVE-2024-38200) can be exploited.....»»

Category: securitySource:  netsecurityRelated NewsAug 18th, 2024

Apple"s Mac mini drops to as low as $499, grab discounts up to $250 off

Today's best Mac mini deals deliver price cuts of up to $250 off and prices as low as $499.The current Mac mini is a popular choice among budget-conscious consumers who are eager to enter the Mac ecosystem. Thanks to back-to-school deals from leading.....»»

Category: appleSource:  appleinsiderRelated NewsAug 18th, 2024

This new threat proves that Macs aren’t immune from malware

The latest malware threat for Mac users targets popular browsers that you could be using this very instant. Which ones are affected?.....»»

Category: topSource:  digitaltrendsRelated NewsAug 16th, 2024

Banshee Stealer malware haunts browser extensions on macOS

Security researchers have discovered a new malware for macOS, which can be used to attack over 100 browser extensions that may be installed on the target Mac.Web browser extensions are the target of Banshee Stealer on macOSApple tries hard to make ma.....»»

Category: appleSource:  appleinsiderRelated NewsAug 16th, 2024