Cyber

Hundreds of code libraries posted to NPM try to install malware on dev machines

These are not the the developer tools you think they are. Credit: Getty Images An ongoing attack is uploading hundreds of malicious packages to the open source node package manager (NPM)...

Android Trojan that intercepts voice calls to banks just got more stealthy

FakeCall malware can reroute calls intended for banks to attacker-controlled numbers. Credit: Getty Images Researchers have...

Systems used by courts and governments across the US riddled with vulnerabilities

With hundreds of courts and agencies affected, chances are one near you is, too. Public...

Hacker plants false memories in ChatGPT to steal user data in perpetuity

Emails, documents, and other untrusted content can plant malicious memories. When security researcher Johann Rehberger...

Google calls for halting use of WHOIS for TLS domain verifications

WHOIS data is unreliable. So why is it used in TLS certificate applications? Certificate authorities...

Hundreds of code libraries posted to NPM try to install malware on dev machines

These are not the the developer tools you think they are. Credit: Getty Images An ongoing attack is uploading hundreds of malicious packages to the open...

Android Trojan that intercepts voice calls to banks just got more stealthy

FakeCall malware can reroute calls intended for banks to attacker-controlled numbers. Credit: Getty Images Researchers have found new versions of a sophisticated Android financial-fraud Trojan that’s...

Systems used by courts and governments across the US riddled with vulnerabilities

With hundreds of courts and agencies affected, chances are one near you is, too. Public records systems that courts and governments rely on to manage...

Hacker plants false memories in ChatGPT to steal user data in perpetuity

Emails, documents, and other untrusted content can plant malicious memories. When security researcher Johann Rehberger recently reported a vulnerability in ChatGPT that allowed attackers to...

Google calls for halting use of WHOIS for TLS domain verifications

WHOIS data is unreliable. So why is it used in TLS certificate applications? Certificate authorities and browser makers are planning to end the use of WHOIS data...

Commercial spyware vendor exploits used by Kremlin-backed hackers, Google says

Findings undercut pledges of NSO Group and Intellexa their wares won't be abused. Critics of spyware and exploit sellers have long warned that the advanced...

Unpatchable 0-day in surveillance cam is being exploited to install Mirai

Vulnerability is easy to exploit and allows attackers to remotely execute commands. Malicious hackers are exploiting a critical vulnerability in a widely used security camera...

Microsoft to host security summit after CrowdStrike disaster

Redmond wants to improve the resilience of Windows to buggy software. Microsoft is stepping up its plans to make Windows more resilient to buggy software...

Android malware steals payment card data using previously unseen technique

Attacker then emulates the card and makes withdrawals or payments from victim's account. Newly discovered Android malware steals payment card data using an infected device’s...

Hackers exploit VMware vulnerability that gives them hypervisor admin

Create new group called "ESX Admins" and ESXi automatically gives it admin rights. Microsoft is urging users of VMware’s ESXi hypervisor to take immediate action...

North Korean hacker got hired by US security vendor, immediately loaded malware

KnowBe4, which provides security awareness training, was fooled by stolen ID. KnowBe4, a US-based security vendor, revealed that it unwittingly hired a North Korean hacker...

Report: Alphabet close to $23 billion deal for cybersecurity startup Wiz

Deal of this size would draw scrutiny from antitrust regulators around the world. Google’s parent company, Alphabet, is in talks to buy cybersecurity start-up Wiz...

Threat actors exploited Windows 0-day for more than a year before Microsoft fixed it

The goal of the exploits was to open Explorer and trick targets into running malicious code. Threat actors carried out zero-day attacks that targeted Windows...

To guard against cyberattacks in space, researchers ask “what if?”

A hack on satellites could cripple much of our digital infrastructure. If space systems such as GPS were hacked and knocked offline, much of the world...
HomeCyber