Cyber

Ongoing attacks on Ivanti VPNs install a ton of sneaky, well-written malware

In-the-wild attacks tamper with built-in security tool to suppress infection warnings. Credit: Getty Images Networks protected by Ivanti VPNs are under active attack by well-resourced hackers who are exploiting a critical...

Time to check if you ran any of these 33 malicious Chrome extensions

Two separate campaigns have been stealing credentials and browsing history for months. Credit: Getty Images As...

Passkey technology is elegant, but it’s most definitely not usable security

Just in time for holiday tech-support sessions, here's what to know about passkeys. Credit: Getty...

Crypto scammers posing as real brands on X are easily hacking YouTubers

Fighting game YouTuber now fighting Google over “monstrous” post-hack revenue loss. Credit: via Capcom USA For months,...

Critical WordPress plugin vulnerability under active exploit threatens thousands

Vulnerability with severity rating of 9.8 out of possible 10 still live on >8,000...

Android malware steals payment card data using previously unseen technique

Attacker then emulates the card and makes withdrawals or payments from victim's account. Newly discovered Android malware steals payment card data using an infected device’s...

Hackers exploit VMware vulnerability that gives them hypervisor admin

Create new group called "ESX Admins" and ESXi automatically gives it admin rights. Microsoft is urging users of VMware’s ESXi hypervisor to take immediate action...

North Korean hacker got hired by US security vendor, immediately loaded malware

KnowBe4, which provides security awareness training, was fooled by stolen ID. KnowBe4, a US-based security vendor, revealed that it unwittingly hired a North Korean hacker...

Report: Alphabet close to $23 billion deal for cybersecurity startup Wiz

Deal of this size would draw scrutiny from antitrust regulators around the world. Google’s parent company, Alphabet, is in talks to buy cybersecurity start-up Wiz...

Threat actors exploited Windows 0-day for more than a year before Microsoft fixed it

The goal of the exploits was to open Explorer and trick targets into running malicious code. Threat actors carried out zero-day attacks that targeted Windows...

To guard against cyberattacks in space, researchers ask “what if?”

A hack on satellites could cripple much of our digital infrastructure. If space systems such as GPS were hacked and knocked offline, much of the world...

384,000 sites pull code from sketchy code library recently bought by Chinese firm

Many website admins, it seems, have yet to get memo to remove Polyfillio links. More than 384,000 websites are linking to a site that was...

“RegreSSHion” vulnerability in OpenSSH gives attackers root on Linux

Full system compromise possible by peppering servers with thousands of connection requests. Researchers have warned of a critical vulnerability affecting the OpenSSH networking utility that...

3 million iOS and macOS apps were exposed to potent supply-chain attacks

Apps that used code libraries hosted on CocoaPods were vulnerable for about 10 years. Vulnerabilities that went undetected for a decade left thousands of macOS...

Mac users served info-stealer malware through Google ads

Full-service Poseidon info stealer pushed by "advertiser identity verified by Google." Mac malware that steals passwords, cryptocurrency wallets, and other sensitive data has been spotted...

High-severity vulnerabilities affect a wide range of Asus router models

Many models receive patches; others will need to be replaced. Enlarge Hardware manufacturer Asus has released updates patching multiple critical vulnerabilities that allow hackers to remotely...

China state hackers infected 20,000 Fortinet VPNs, Dutch spy service says

Critical code-execution flaw was under exploitation 2 months before company disclosed it. Hackers working for the Chinese government gained access to more than 20,000 VPN...

Ransomware gangs are adopting “more brutal” tactics amid crackdowns

Researchers fear real-world violence as law enforcement plays Whac-A-Mole with gangs. Today, people around the world will head to school, doctor’s appointments, and pharmacies, only...

Nasty bug with very simple exploit hits PHP just in time for the weekend

With PoC code available and active Internet scans, speed is of the essence. A critical vulnerability in the PHP programming language can be trivially exploited...
HomeCyber