Malicious packages sneaked into NPM repository stole Discord tokens
People's trust in repositories make them the perfect vectors for malware. Enlarge (credit: Getty Images) Researchers have found another 17 malicious packages in an open source repository, as the use of such repositories to spr.....»»
Several malicious Telegram clones for Android found on Google Play
More malicious apps have been found on the Play Store with potential links to the Chinese repression of ethnic minorities......»»
Malicious Google ads deceive Mac users into installing Atomic Stealer malware
A macOS malware discovered in April has found a new vector of attack, with people searching for software on Google finding malware presented as legitimate ads.Google search can turn up malicious adsThe malware payload known as Atomic macOS Stealer (A.....»»
Emerging threat: AI-powered social engineering
Social engineering is a sophisticated form of manipulation but, thanks to AI advancements, malicious groups have gained access to highly sophisticated tools, suggesting that we might be facing more elaborate social engineering attacks in the future......»»
Malicious attackers can flood iPhone users with endless popups using a $170 tool
Devices like the Flipper Zero can send out pre-programmed radio signals that can cause an iPhone to open a disruptive interface, effectively being attacked into temporary uselessness.Not Your AirPodsApple products like the iPhone have various communi.....»»
Reflectiz offers remote solution to battle Magecart attacks
Reflectiz, a cybersecurity company specializing in continuous web threat management, offers a remote solution to battle Magecart web-skimming attacks, a cyberattack involving injecting malicious code into the checkout pages. As the holiday season app.....»»
macOS Sonoma could be locked down with XProtect behavioral security
Apple could make macOS Sonoma more proactive when it comes to scanning for malware, with a malicious behavior-detecting iteration of XProtect seemingly getting closer to going live.Malware illustrationApple's XProtect is a set of rules that are used.....»»
Thief decides iPhone is worth more than dentistry, chews through security cable
A woman in China balked at the price tag on an iPhone 14 Plus and, biting through the anti-theft cable, stole one from an Apple Store.Apple's iPhone 14 Plus in purpleIt's not uncommon for iPhones to be stolen from stores, and it's not unknown for the.....»»
Spam is up, QR codes emerge as a significant threat vector
85% of phishing emails utilized malicious links in the content of the email, and spam emails increased by 30% from Q1 to Q2 2023, according to a VIPRE report. Information technology organizations also overtook financial institutions (9%) as the most.....»»
Bambu Has A Big Week: Rogue 3D Printers And A New Model Repository
This has been a big news week for the 3D printer company Bambu Labs. Some of it was pretty bad and some of it could be pretty good. Let’s get that bad news out of the way first. Rogue printing due to cloud services Recently, many Bambu 3D prin.....»»
Slavery stole Africans" ideas as well as their bodies: Reparations should reflect this, say researchers
In a speech to mark Unesco's campaign for the Remembrance of the Slave Trade and its Abolition, UN secretary-general António Guterres told the United Nations general assembly earlier this year that the inequalities created by 400 years of the transa.....»»
WinRAR 0-day that uses poisoned JPG and TXT files under exploit since April
Vulnerability allows hackers to execute malicious code when targets open malicious ZIP files. Enlarge (credit: Getty Images) A newly discovered zero-day in the widely used WinRAR file-compression program has been exploit.....»»
Seiko is apparently the latest victim of the BlackCat ransomware
The watchmaker said someone stole sensitive data, and BlackCat posted samples on its leak site......»»
VersaAI delivers AI-assisted enhancements across the Versa Networks portfolio
Versa Networks has released a set of enhancements to VersaAI that includes new embedded generative AI capabilities to identify malicious behaviors in real time, secure generative AI tools, and enhance network and security operational excellence. Thes.....»»
Anonymous file-sharing site has shut down after "years of abuse"
Anonfiles operators grew tired of trying to remove malicious content being uploaded constantly......»»
An Apple malware-flagging tool is “trivially” easy to bypass
Background Task Manager can potentially miss malicious software on your machine. Enlarge (credit: Getty Images) One of your Mac's built-in malware detection tools may not be working quite as well as you think. At the Def.....»»
Streaming TV costs now higher than cable, as ‘crash’ finally hits
Streaming TV costs are now higher than cable packages, says a new analysis. It follows warnings that a “crash” was on the way – a day that has now arrived. The report says that after price rises by Apple TV+, HBO Max, Disney, Hulu, and other.....»»
How to handle API sprawl and the security threat it poses
The proliferation of APIs has marked them as prime targets for malicious attackers. With recent reports indicating that API vulnerabilities are costing businesses billions of dollars annually, it’s no wonder they are at the top of mind of many cybe.....»»
Amazon won’t stop sending tortured woman unwanted boxes of shoes
Fifty unwanted Amazon packages arrived in two months, mostly containing shoes. Enlarge (credit: Bloomberg / Contributor | Bloomberg) Amazon ships more than a million packages daily, but there's at least one person in a m.....»»
In the age of ChatGPT, Macs are under malware assault
ChatGPT is changing the world, but is it giving hackers new tools to make malicious Mac malware? We interviewed a new Mac security outfit to find out......»»
What are “drainer smart contracts” and why is the FBI warning of them?
Scam sites often pose as outlets selling non-fungible tokens. Enlarge (credit: Getty Images) The FBI is advising potential NFT buyers to be on the lookout for malicious websites that use “drainer smart contracts” to.....»»