Cyber

Critical WordPress plugin vulnerability under active exploit threatens thousands

Vulnerability with severity rating of 9.8 out of possible 10 still live on >8,000 sites. Credit: Getty Images Thousands of sites running WordPress remain unpatched against a critical security flaw in...

5 charged in “Scattered Spider,” one of the most profitable phishing scams ever

Phishing attacks were so well-orchestrated that they fooled some of the best in the...

Hundreds of code libraries posted to NPM try to install malware on dev machines

These are not the the developer tools you think they are. Credit: Getty Images An ongoing...

Android Trojan that intercepts voice calls to banks just got more stealthy

FakeCall malware can reroute calls intended for banks to attacker-controlled numbers. Credit: Getty Images Researchers have...

Systems used by courts and governments across the US riddled with vulnerabilities

With hundreds of courts and agencies affected, chances are one near you is, too. Public...

Law enforcement operation takes aim at an often-overlooked cybercrime linchpin

Officials hope to sever a component crucial to the larger malware landscape. An international cast of law enforcement agencies has struck a blow at a...

Municipal broadband advocates fight off attacks from “dark money” groups

"Social welfare" groups spread industry talking points against public broadband. Cities and towns that build their own broadband networks often say they only considered the...

Researchers spot cryptojacking attack that disables endpoint protections

A key component: Installing known vulnerable drivers from Avast and IOBit. Malware recently spotted in the wild uses sophisticated measures to disable antivirus protections, destroy...

Black Basta ransomware group is imperiling critical infrastructure, groups warn

Threat group has targeted 500 organizations. One is currently struggling to cope. Federal agencies, health care associations, and security researchers are warning that a ransomware...

Claimed by hackers, Zscaler says there’s no impact or compromise

Cloud security company Zscaler is continuing an investigation into an alleged breach after a threat actor started selling “access to one of the largest...

Apple iOS app causes injury to over 200 people

An iOS app designed to help manage diabetes has caused harm to over 220 people due to a defect in the application. Tandem Diabetes Care,...

Google patches its fifth zero-day vulnerability of the year in Chrome

Exploit code for critical "use-after-free" bug is circulating in the wild. Google has updated its Chrome browser to patch a high-severity zero-day vulnerability that allows...

Windows 11 to enable BitLocker storage encryption by default

A clean installation of Windows 11 may soon automatically activate BitLocker and encrypt the hard drive (storage device) by default, as present in the...

Fedora Asahi Remix 40 is another big step forward for Linux on Apple Silicon Macs

Only one kinda big thing really holds back this impressive collective effort. Asahi Linux, the project that aims to bring desktop Linux to Apple hardware...

Critical vulnerabilities in BIG-IP appliances leave big networks open to intrusion

Hackers can exploit them to gain full administrative control of internal devices. Researchers on Wednesday reported critical vulnerabilities in a widely used networking appliance that...

Hackers discover how to reprogram NES Tetris from within the game

New method could help high-score chasers trying to avoid game-ending crashes. Earlier this year, we shared the story of how a classic NES Tetris player hit the game's "kill...

Novel attack against virtually all VPN apps neuters their entire purpose

TunnelVision vulnerability has existed since 2002 and may already be known to attackers. Researchers have devised an attack against nearly all virtual private network applications...

ASCII art elicits harmful responses from 5 major AI chatbots

LLMs are trained to block harmful responses. Old-school images can override those rules. Researchers have discovered a new way to hack AI assistants that uses...

Security footage of Boeing repair before door-plug blowout was overwritten

NTSB: Boeing "unable to find the records documenting" repair work on 737 Max 9. A government investigation into a Boeing 737 Max 9 plane's door-plug...
HomeCyber