Cyber

Ongoing attacks on Ivanti VPNs install a ton of sneaky, well-written malware

In-the-wild attacks tamper with built-in security tool to suppress infection warnings. Credit: Getty Images Networks protected by Ivanti VPNs are under active attack by well-resourced hackers who are exploiting a critical...

Time to check if you ran any of these 33 malicious Chrome extensions

Two separate campaigns have been stealing credentials and browsing history for months. Credit: Getty Images As...

Passkey technology is elegant, but it’s most definitely not usable security

Just in time for holiday tech-support sessions, here's what to know about passkeys. Credit: Getty...

Crypto scammers posing as real brands on X are easily hacking YouTubers

Fighting game YouTuber now fighting Google over “monstrous” post-hack revenue loss. Credit: via Capcom USA For months,...

Critical WordPress plugin vulnerability under active exploit threatens thousands

Vulnerability with severity rating of 9.8 out of possible 10 still live on >8,000...

Ongoing attacks on Ivanti VPNs install a ton of sneaky, well-written malware

In-the-wild attacks tamper with built-in security tool to suppress infection warnings. Credit: Getty Images Networks protected by Ivanti VPNs are under active attack by well-resourced hackers...

Time to check if you ran any of these 33 malicious Chrome extensions

Two separate campaigns have been stealing credentials and browsing history for months. Credit: Getty Images As many of us celebrated the year-end holidays, a small group...

Passkey technology is elegant, but it’s most definitely not usable security

Just in time for holiday tech-support sessions, here's what to know about passkeys. Credit: Getty Images It's that time again, when families and friends gather and...

Crypto scammers posing as real brands on X are easily hacking YouTubers

Fighting game YouTuber now fighting Google over “monstrous” post-hack revenue loss. Credit: via Capcom USA For months, popular fighting game YouTubers have been under attack. Even the...

Critical WordPress plugin vulnerability under active exploit threatens thousands

Vulnerability with severity rating of 9.8 out of possible 10 still live on >8,000 sites. Credit: Getty Images Thousands of sites running WordPress remain unpatched against...

5 charged in “Scattered Spider,” one of the most profitable phishing scams ever

Phishing attacks were so well-orchestrated that they fooled some of the best in the business. Credit: Getty Images Federal prosecutors have charged five men with running...

Hundreds of code libraries posted to NPM try to install malware on dev machines

These are not the the developer tools you think they are. Credit: Getty Images An ongoing attack is uploading hundreds of malicious packages to the open...

Android Trojan that intercepts voice calls to banks just got more stealthy

FakeCall malware can reroute calls intended for banks to attacker-controlled numbers. Credit: Getty Images Researchers have found new versions of a sophisticated Android financial-fraud Trojan that’s...

Systems used by courts and governments across the US riddled with vulnerabilities

With hundreds of courts and agencies affected, chances are one near you is, too. Public records systems that courts and governments rely on to manage...

Hacker plants false memories in ChatGPT to steal user data in perpetuity

Emails, documents, and other untrusted content can plant malicious memories. When security researcher Johann Rehberger recently reported a vulnerability in ChatGPT that allowed attackers to...

Google calls for halting use of WHOIS for TLS domain verifications

WHOIS data is unreliable. So why is it used in TLS certificate applications? Certificate authorities and browser makers are planning to end the use of WHOIS data...

Commercial spyware vendor exploits used by Kremlin-backed hackers, Google says

Findings undercut pledges of NSO Group and Intellexa their wares won't be abused. Critics of spyware and exploit sellers have long warned that the advanced...

Unpatchable 0-day in surveillance cam is being exploited to install Mirai

Vulnerability is easy to exploit and allows attackers to remotely execute commands. Malicious hackers are exploiting a critical vulnerability in a widely used security camera...

Microsoft to host security summit after CrowdStrike disaster

Redmond wants to improve the resilience of Windows to buggy software. Microsoft is stepping up its plans to make Windows more resilient to buggy software...
HomeCyber