Cyber

Hundreds of code libraries posted to NPM try to install malware on dev machines

These are not the the developer tools you think they are. Credit: Getty Images An ongoing attack is uploading hundreds of malicious packages to the open source node package manager (NPM)...

Android Trojan that intercepts voice calls to banks just got more stealthy

FakeCall malware can reroute calls intended for banks to attacker-controlled numbers. Credit: Getty Images Researchers have...

Systems used by courts and governments across the US riddled with vulnerabilities

With hundreds of courts and agencies affected, chances are one near you is, too. Public...

Hacker plants false memories in ChatGPT to steal user data in perpetuity

Emails, documents, and other untrusted content can plant malicious memories. When security researcher Johann Rehberger...

Google calls for halting use of WHOIS for TLS domain verifications

WHOIS data is unreliable. So why is it used in TLS certificate applications? Certificate authorities...

Researchers spot cryptojacking attack that disables endpoint protections

A key component: Installing known vulnerable drivers from Avast and IOBit. Malware recently spotted in the wild uses sophisticated measures to disable antivirus protections, destroy...

Black Basta ransomware group is imperiling critical infrastructure, groups warn

Threat group has targeted 500 organizations. One is currently struggling to cope. Federal agencies, health care associations, and security researchers are warning that a ransomware...

Claimed by hackers, Zscaler says there’s no impact or compromise

Cloud security company Zscaler is continuing an investigation into an alleged breach after a threat actor started selling “access to one of the largest...

Apple iOS app causes injury to over 200 people

An iOS app designed to help manage diabetes has caused harm to over 220 people due to a defect in the application. Tandem Diabetes Care,...

Google patches its fifth zero-day vulnerability of the year in Chrome

Exploit code for critical "use-after-free" bug is circulating in the wild. Google has updated its Chrome browser to patch a high-severity zero-day vulnerability that allows...

Windows 11 to enable BitLocker storage encryption by default

A clean installation of Windows 11 may soon automatically activate BitLocker and encrypt the hard drive (storage device) by default, as present in the...

Fedora Asahi Remix 40 is another big step forward for Linux on Apple Silicon Macs

Only one kinda big thing really holds back this impressive collective effort. Asahi Linux, the project that aims to bring desktop Linux to Apple hardware...

Critical vulnerabilities in BIG-IP appliances leave big networks open to intrusion

Hackers can exploit them to gain full administrative control of internal devices. Researchers on Wednesday reported critical vulnerabilities in a widely used networking appliance that...

Hackers discover how to reprogram NES Tetris from within the game

New method could help high-score chasers trying to avoid game-ending crashes. Earlier this year, we shared the story of how a classic NES Tetris player hit the game's "kill...

Novel attack against virtually all VPN apps neuters their entire purpose

TunnelVision vulnerability has existed since 2002 and may already be known to attackers. Researchers have devised an attack against nearly all virtual private network applications...

ASCII art elicits harmful responses from 5 major AI chatbots

LLMs are trained to block harmful responses. Old-school images can override those rules. Researchers have discovered a new way to hack AI assistants that uses...

Security footage of Boeing repair before door-plug blowout was overwritten

NTSB: Boeing "unable to find the records documenting" repair work on 737 Max 9. A government investigation into a Boeing 737 Max 9 plane's door-plug...

Hackers can read private AI-assistant chats even though they’re encrypted

All non-Google chat GPTs affected by side channel that leaks responses sent to users. AI assistants have been widely available for a little more than...

Microsoft says Kremlin-backed hackers accessed its source and internal systems

Midnight Blizzard is now using stolen secrets in follow-on attacks against customers. Microsoft said that Kremlin-backed hackers who breached its corporate network in January have...
HomeCyber