Cyber

Ongoing attacks on Ivanti VPNs install a ton of sneaky, well-written malware

In-the-wild attacks tamper with built-in security tool to suppress infection warnings. Credit: Getty Images Networks protected by Ivanti VPNs are under active attack by well-resourced hackers who are exploiting a critical...

Time to check if you ran any of these 33 malicious Chrome extensions

Two separate campaigns have been stealing credentials and browsing history for months. Credit: Getty Images As...

Passkey technology is elegant, but it’s most definitely not usable security

Just in time for holiday tech-support sessions, here's what to know about passkeys. Credit: Getty...

Crypto scammers posing as real brands on X are easily hacking YouTubers

Fighting game YouTuber now fighting Google over “monstrous” post-hack revenue loss. Credit: via Capcom USA For months,...

Critical WordPress plugin vulnerability under active exploit threatens thousands

Vulnerability with severity rating of 9.8 out of possible 10 still live on >8,000...

FCC pushes ISPs to fix security flaws in Internet routing

Chair: Addressing BGP flaws will "help make our Internet routing more secure." The Federal Communications Commission wants to verify that Internet service providers are strengthening...

What kind of bug would make machine learning suddenly 40% worse at NetHack?

One day, a roguelike-playing system just kept biffing it, for celestial reasons. Members of the Legendary Computer Bugs Tribunal, honored guests, if I may have...

Ticketmaster hacked in what’s believed to be a spree hitting Snowflake customers

Researcher says Snowflake customers hit by mass scraping ... "but nobody noticed." Cloud storage provider Snowflake said that accounts belonging to multiple customers have been...

Federal agency warns critical Linux vulnerability being actively exploited

Cybersecurity and Infrastructure Security Agency urges affected users to update ASAP. The US Cybersecurity and Infrastructure Security Agency has added a critical security bug in...

Law enforcement operation takes aim at an often-overlooked cybercrime linchpin

Officials hope to sever a component crucial to the larger malware landscape. An international cast of law enforcement agencies has struck a blow at a...

Municipal broadband advocates fight off attacks from “dark money” groups

"Social welfare" groups spread industry talking points against public broadband. Cities and towns that build their own broadband networks often say they only considered the...

Researchers spot cryptojacking attack that disables endpoint protections

A key component: Installing known vulnerable drivers from Avast and IOBit. Malware recently spotted in the wild uses sophisticated measures to disable antivirus protections, destroy...

Black Basta ransomware group is imperiling critical infrastructure, groups warn

Threat group has targeted 500 organizations. One is currently struggling to cope. Federal agencies, health care associations, and security researchers are warning that a ransomware...

Claimed by hackers, Zscaler says there’s no impact or compromise

Cloud security company Zscaler is continuing an investigation into an alleged breach after a threat actor started selling “access to one of the largest...

Apple iOS app causes injury to over 200 people

An iOS app designed to help manage diabetes has caused harm to over 220 people due to a defect in the application. Tandem Diabetes Care,...

Google patches its fifth zero-day vulnerability of the year in Chrome

Exploit code for critical "use-after-free" bug is circulating in the wild. Google has updated its Chrome browser to patch a high-severity zero-day vulnerability that allows...

Windows 11 to enable BitLocker storage encryption by default

A clean installation of Windows 11 may soon automatically activate BitLocker and encrypt the hard drive (storage device) by default, as present in the...

Fedora Asahi Remix 40 is another big step forward for Linux on Apple Silicon Macs

Only one kinda big thing really holds back this impressive collective effort. Asahi Linux, the project that aims to bring desktop Linux to Apple hardware...

Critical vulnerabilities in BIG-IP appliances leave big networks open to intrusion

Hackers can exploit them to gain full administrative control of internal devices. Researchers on Wednesday reported critical vulnerabilities in a widely used networking appliance that...
HomeCyber