Items tagged with cybersecurity
by
Alan Velasco - Tue, Sep 24, 2024
Security software provider Kaspersky, which will soon be banned from selling or providing its services in the United States, promised a smooth transition for current customers. However, many of these customers were shocked to find that...
Read more...
by
Alan Velasco - Tue, Sep 24, 2024
In what feels like déjà vu, a particular piece of Android malware has managed to sneak its way back into apps available in the Google Play Store after initially being discovered in 2019. The security research team at Kaspersky shared that...
Read more...
by
Alan Velasco - Sun, Aug 25, 2024
Researchers at Cado Security have found new malware targeting maOS users, which is dubbed “Cthulhu Stealer.” The malicious app attempts to deceiver users by masquerading as legitimate software, such as CleanMyMac, Grand Theft Auto IV, and...
Read more...
by
Alan Velasco - Wed, Aug 21, 2024
Security researchers at Cisco Talos have discovered a set of vulnerabilities affecting macOS users who have Microsoft applications installed on their computers, providing more attack vectors for malicious actors. The researchers say that...
Read more...
by
Alan Velasco - Mon, Aug 19, 2024
More malware targeting Mac users has been found by searchers at security firm Elastic Security Labs. The malicious software has been dubbed “Banshee Stealer,” and it is able to compromise systems using either Intel or Apple Silicon chips...
Read more...
by
Zak Killian - Sat, Aug 17, 2024
This one's important, so let's get right to it: a new security flaw in all versions of Windows opens the door for a wormable remote code execution vulnerability. That means it can be exploited by an automated worm with zero user...
Read more...
by
Alan Velasco - Tue, Aug 13, 2024
Yet another leak of stolen data has made its way to Breach Forums, a popular site for bad actors who traffic in this kind of data theft. The data originates from the breach of National Public Data, which is a service that gathers...
Read more...
by
Alan Velasco - Fri, Aug 02, 2024
Security firm Cleafy has discovered a new piece of Android malware being used in the wild, dubbed BingoMod. BingoMod is designed to steal money from a victim by committing On Device Fraud, which makes it easier to bypass security measures...
Read more...
by
Alan Velasco - Fri, Jul 12, 2024
Apple users located across 98 countries have received notifications from the company that they have been targeted in a recent spyware campaign, according to a report by TechCrunch. This is part an initiative by Apple to warn users who are...
Read more...
by
Alan Velasco - Sun, Jul 07, 2024
Security firm Symantec has posted a bulletin about a smishing (SMS phishing) campaign currently targeting Apple users in the United States. The end of goal for these threat actors is to take over a user’s Apple ID, which provides them...
Read more...
by
Alan Velasco - Sun, Jun 23, 2024
Cybersecurity firm Check Point Research has discovered a potent piece of Android malware, called Rafel, being utilized by threat actors. The malware is an open-source remote administration tool (RAT) and Check Point Research says that it...
Read more...
by
Alan Velasco - Wed, Jun 19, 2024
It appears that AMD is now the latest victim of cybercrime and a data breach, as company data is being offered for sale on a message board frequented by criminal hackers. AMD acknowledged the situation in a statement, noting that, "we are...
Read more...
by
Alan Velasco - Tue, May 28, 2024
Threat actors are actively trying to exploit VPN environments that make use of remote access at an accelerated rate, in order to infiltrate and attack enterprise networks, according to cyber security firm Check Point. The company says the...
Read more...
by
Nathan Ord - Mon, May 20, 2024
Are you looking to get some laundry done on the cheap or, even better yet, free? It turns out a security flaw in a popular internet-connected laundry machine vendor could allow anyone to avoid paying the fee for washing or drying clothes...
Read more...
by
Nathan Ord - Mon, May 13, 2024
It has been a little while since our last major data breach, with the latest being back on April Fools' with AT&T having the information of 73 million accounts appear on the dark web. However, hackers never rest so it was simply a matter...
Read more...
by
Nathan Ord - Tue, May 07, 2024
Artificial intelligence has been used for some rather interesting applications, such as helping people deal with losing a loved one. While this is a unique use of the technology, there is so much more that AI can be used to improve our...
Read more...
by
Nathan Ord - Sun, May 05, 2024
Earlier this month, Microsoft discovered a vulnerability pattern in Android applications that could enable overwriting files and allow remote code execution. This issue that could be leveraged by attackers has also been seen in the wild...
Read more...
by
Nathan Ord - Mon, Apr 22, 2024
In the past few years, the ransomware market has heated up, leading to more payouts for threat actors and more attacks overall. However, in late 2023, with the seizure of BlackCat ALPHV by law enforcement, among other factors, the business...
Read more...
by
Nathan Ord - Fri, Apr 19, 2024
If you are a threat actor and want to mine cryptocurrency or steal some juicy information, a gamer’s PC is a good target for that sort of thing, given the hardware and software they use. Even better yet is the PC of a game cheater because...
Read more...
by
Nathan Ord - Wed, Apr 10, 2024
End-of-life hardware can be quite the problem at times, even crashing back into Earth’s atmosphere at supersonic speeds for that matter. Of course, we wouldn’t expect such travesties happening with the hardware you keep in your basement...
Read more...
by
Nathan Ord - Sun, Mar 31, 2024
Over the past few days, the security world has been abuzz with the discovery of a backdoor snuck into a compression utility called xz-utils. While this backdoor was effectively a near miss, getting caught before it became pervasive, it...
Read more...
by
Nathan Ord - Sun, Mar 24, 2024
A team of researchers recently found a side-channel vulnerability in Apple’s custom SoC architecture that does not appear patchable and allows for the theft of encryption keys.
The research team, which hails from six different...
Read more...