Items tagged with security
Over the past few days, the security world has been abuzz with the discovery of a backdoor snuck into a compression utility called xz-utils. While this backdoor was effectively a near miss, getting caught before it became pervasive, it goes to show that with a bit of social engineering and laying low for a while, you...
Read more...
A team of researchers recently found a side-channel vulnerability in Apple’s custom SoC architecture that does not appear patchable and allows for the theft of encryption keys.
The research team, which hails from six different universities around the United States, published its findings and is calling it the...
Read more...
Most experts would suggest that humans are the weakest link in cybersecurity, which is evidenced by the pervasiveness of phishing emails and whatnot. However, it’s not just end users that can be a problem. System administrators are human too, and can introduce serious problems just the same. This is what a group of...
Read more...
Over the weekend, the hero shooter game Apex Legends, made by EA and Respawn Entertainment, held a tournament that was reportedly compromised by hackers. Multiple players' systems were breached, and game cheats such as X-ray vision and aimbots were installed. How exactly this happened is unclear at this time, but it seems as if it is an issue
Read more...
StopCrypt ransomware is one of the most prolific yet underreported ransomware families due to its usual target of individuals rather than high-profile businesses or larger entities. We may not see this strain of ransomware in the United States as much, but it is still a threat regardless, and an evolving one at that...
Read more...
Google Chrome users are about to get a more secure browsing experience thanks to some updates coming to desktop and iOS. Google Safe Browsing will be getting real-time, privacy-preserving URL protection, while useful additions are coming to Password Checkup. Android users will need to wait a little bit, as these...
Read more...
This week, researchers have reported that earlier this year, threat actors leveraged a vulnerability in Windows to deploy DarkGate malware after phishing the victim for initial access. The vulnerability tracked as CVE-2024-21412 led to users running fake Microsoft software installer (.MSI) packages that looked like...
Read more...
Over the past few months, the infamous ransomware group LockBit has faced significant turmoil, including threatening a forum administrator with murder. All while this was happening, members of the group like Mikhail Vasiliev were sitting in jail, awaiting trial for their cybersecurity crimes. Now, Vasiliev has been...
Read more...
Account credentials and personal data are hot commodities online, which often going up for sale at low prices so shady characters can move thousands of accounts quickly. This is reportedly what has happened to just over 15,000 Roku customers who had their accounts compromised due to credential stuffing attacks that...
Read more...
A new feature in the latest beta for WhatsApp gives users more peace of mind that their messages and calls made within the app are end-to-end encrypted. The latest enhancement provides a visual confirmation that their chats are indeed securely encrypted using the Signal protocol.
Most people who use WhatsApp do so...
Read more...
Researchers have shown that running a man-in-the-middle attack against a Tesla owner can potentially compromise their account, unlock their car, and ultimately allow threat actors to drive away with it. There are, of coruse, a number a caveats. Much of this hinges on some social engineering, and tricking the Tesla owner to use a spoofed Wi-Fi
Read more...
The Federal Bureau of Investigation’s Internet Crime Complaint Center (IC3) is the primary interface between the public and the U.S. government, to report cybercrime and collect information about cybersecurity threats. The IC3 recently published a paper outlining a significant increase in reports and losses throughout...
Read more...
Following yesterday's report on an Air National Guard member sharing classified documents around the Internet, it seems the U.S. Government cannot catch a break. A 63-year-old civilian member of the U.S. Air Force assigned to U.S. Strategic Command was arrested on March 2nd “allegedly conspiring to transmit and...
Read more...
Facebook, Instagram, and other Meta-owned properties went down earlier today and are still suffering from the aftershocks. Reports initially started to surface suggesting that threat actors were behind this and that it was a DDoS attack, but Meta appears to be claiming otherwise. Whether this was a technical issue or...
Read more...
Early in 2023, a Department of Defense leaker was nabbed after a year of posting sensitive documents to a Minecraft Discord server. Those documents made their way to sites like 4chan and elsewhere on the internet, and included a plethora of sensitive intelligence information. The leaker has since pled guilty and is...
Read more...
The criminal underbelly of cybersecurity is a shady place, with threat actors thieving data and information wherever possible. On the seemingly competent side of the business, some folks also wish to make a quick buck off the latest hype and not do much actual hacking. Such is the case with the now former group called...
Read more...
The Flipper Zero, known for its use in widespread shenaniganry, is quite the little hacking device in all actuality. This pint-size hacking device is great for cloning hotel keys, opening garages (or Tesla charging ports), adjusting TVs you lost the remote for, and other hacker-type things, especially on penetration...
Read more...
Both Helldivers 2 and Palworld have seen explosive growth and popularity since their respective releases, drawing in millions of gamers around the world. With this popularity, though, also comes opportunistic folks trying to make a quick buck by piggybacking off the hype. This is exactly what happened both titles...
Read more...
There has been a smorgasbord of breaches as of late, though the U.S. government, in conjunction with international partners, is starting to quell that problem. However, in the past year, threat actors have had their pick of the buffet for breaches, which now includes Golden Corral, a literal buffet. The famous...
Read more...
Cybersecurity is an incredibly complex and vast topic, requiring a multifaceted approach across multiple sectors and disciplines, so the White House wants you to stop using C and C++. While that is a bit of an unnuanced simplification, this is essentially the case, following a publication from the Office of the...
Read more...
Most forms of malware can only make the attacker money in a roundabout way. For example, selling stolen data or bundling infected systems into a rentable botnet. Ransomware is different, however, in that it can be a moneymaker all on its own, and that's why infections have increased every year. IBM has debuted a new...
Read more...
It turns out that you do not need Chinese backdoors in products if people are just installing IoT devices with poor security. This is evidenced by a recent report regarding video doorbells manufactured by a Chinese company, which can be easily compromised. Further, these doorbells are sold around the United States at...
Read more...