WinRAR 0-day that uses poisoned JPG and TXT files under exploit since April
Vulnerability allows hackers to execute malicious code when targets open malicious ZIP files. Enlarge (credit: Getty Images) A newly discovered zero-day in the widely used WinRAR file-compression program has been exploit.....»»
After reviewing two data recovery services, I know which one I’d use next time
EaseUS and Disk Drill data recovery apps go head-to-head to find out which free and paid version restores more files at the best price......»»
Lateral movement: Clearest sign of unfolding ransomware attack
44% of unfolding ransomware attacks were spotted during lateral movement, according to Barracuda Networks. 25% of incidents were detected when the attackers started writing or editing files, and 14% were unmasked by behavior that didn’t fit with kn.....»»
How to prioritize data privacy in core customer-facing systems
Evolving global data privacy regulations are keeping marketers on their toes. In April 2024, the American Privacy Rights Act (APRA) was introduced in the Senate. The proposed bill would create a federal consumer privacy framework akin to the GDPR, wh.....»»
Adversaries love bots, short-lived IP addresses, out-of-band domains
Fastly found 91% of cyberattacks – up from 69% in 2023 – targeted multiple customers using mass scanning techniques to uncover and exploit software vulnerabilities, revealing an alarming trend in attacks spreading across a broader target base. In.....»»
Threads testing new option for temporary 24 hour posts
Meta began experimenting with an option for auto-archiving posts back in April, but the feature never came to fruition in that form. However, the company has now confirmed that they’re experimenting with a new ephemeral post format, where users can.....»»
Volvo Trucks picks Monterrey for $700 million Mexico assembly plant
Volvo AB said in April that it aimed to build a plant in Mexico to supply the group's Volvo Trucks and Mack Trucks businesses in the U.S. and Canada as well as Mack Trucks in Mexico and Latin America. .....»»
Fatal Fury: City of the Wolves launches in April with some key features
Fatal Fury: City of the Wolves is coming next April, and it boasts key features like rollback netcode......»»
Cybercriminals exploit file sharing services to advance phishing attacks
Threat actors use popular file-hosting or e-signature solutions as a disguise to manipulate their targets into revealing private information or downloading malware, according to Abnormal Security. A file-sharing phishing attack is a unique type of ph.....»»
FTC files administrative complaint against Asbury, alleges payment packing, discrimination in Texas
The Federal Trade Commission has filed an administrative complaint against Asbury Automotive Group, alleging payment packing, adding F&I products without consumer knowledge and charging Black and Latino customers more than white ones......»»
Pindrop Pulse Inspect analyzes and verifies whether media files contain synthetic speech
Pindrop launched Pindrop Pulse Inspect in Preview. This innovative tool, the latest addition to Pindrop’s deepfake detection Pindrop Pulse product family, can detect AI-generated speech in any digital audio file with 99% accuracy. Following the.....»»
Hide yo environment files! Or risk getting your cloud-stored data stolen and held for ransom
Cybercriminals are breaking into organizations’ cloud storage containers, exfiltrating their sensitive data and, in several cases, have been paid off by the victim organizations to not leak or sell the stolen data. “The attackers behind t.....»»
Sonos contemplates bringing back its old app amid hardware headwind and layoffs
Sonos has had a tough time since it launched a brand-new app in April that was met with instant and harsh criticism from customers. While the company has a plan to fix the new app, Sonos leadership is considering the possibility of relaunching its ol.....»»
Current attacks, targets, and other threat landscape trends
In this Help Net Security video, Kendall McKay, Strategic Lead, Cyber Threat Intelligence at Cisco Talos, discusses the trends that Cisco Talos incident response observed in incident response engagements from Q2 2024, which covers April to June. Whil.....»»
Windows is getting its own version of AirDrop
A new feature is coming to Phone Link on Windows PCs -- the ability to seamlessly share files with mobile devices running Android......»»
UAW files charges against Trump, Musk for trying to intimidate workers
UAW files charges against Trump, Musk for trying to intimidate workers, with the action came after Musk and Trump held a two-hour conversation on social media platform X the evening of Aug. 12......»»
"Killer robots" are becoming a real threat in Africa
The use of drones in the Sahel, a region of Africa that has been plagued by violence driven by jihadist insurgency for much of the past decade, has become a real problem. In April, for example, Al Qaeda's affiliate in the Sahel, Jama'at Nusrat al Isl.....»»
A major Sonos exploit was explained at Black Hat — but you needn’t worry
Researchers from NCC Group showed how a Sonos One could fall victim to an attack that would let someone listen in on the microphones......»»
Malware-as-a-Service and Ransomware-as-a-Service lower barriers for cybercriminals
The sophistication of cyber threats has escalated dramatically, with malicious actors’ deploying advanced tactics, techniques, and procedures (TTPs) to exploit vulnerabilities and evade detection, according to Darktrace. Subscription-based tools su.....»»
This Windows Update exploit is downright terrifying
A new tool called Windows Downdate can trick your PC into thinking that it's fully patched, all the while exposing you to dangerous vulnerabilities......»»
macOS Sequoia to fix exploit that lets hackers access internal networks
Apple and other tech companies are constantly looking for ways to improve the security of their operating systems. Even so, some things go unnoticed. An exploit from 18 years ago is still being actively used by hackers to access internal networks, bu.....»»