Cyber

Commercial spyware vendor exploits used by Kremlin-backed hackers, Google says

Findings undercut pledges of NSO Group and Intellexa their wares won't be abused. Critics of spyware and exploit sellers have long warned that the advanced hacking sold by commercial surveillance...

Unpatchable 0-day in surveillance cam is being exploited to install Mirai

Vulnerability is easy to exploit and allows attackers to remotely execute commands. Malicious hackers are...

Microsoft to host security summit after CrowdStrike disaster

Redmond wants to improve the resilience of Windows to buggy software. Microsoft is stepping up...

Android malware steals payment card data using previously unseen technique

Attacker then emulates the card and makes withdrawals or payments from victim's account. Newly discovered...

Hackers exploit VMware vulnerability that gives them hypervisor admin

Create new group called "ESX Admins" and ESXi automatically gives it admin rights. Microsoft is...

Windows 11 to enable BitLocker storage encryption by default

A clean installation of Windows 11 may soon automatically activate BitLocker and encrypt the hard drive (storage device) by default, as present in the...

Fedora Asahi Remix 40 is another big step forward for Linux on Apple Silicon Macs

Only one kinda big thing really holds back this impressive collective effort. Asahi Linux, the project that aims to bring desktop Linux to Apple hardware...

Critical vulnerabilities in BIG-IP appliances leave big networks open to intrusion

Hackers can exploit them to gain full administrative control of internal devices. Researchers on Wednesday reported critical vulnerabilities in a widely used networking appliance that...

Hackers discover how to reprogram NES Tetris from within the game

New method could help high-score chasers trying to avoid game-ending crashes. Earlier this year, we shared the story of how a classic NES Tetris player hit the game's "kill...

Novel attack against virtually all VPN apps neuters their entire purpose

TunnelVision vulnerability has existed since 2002 and may already be known to attackers. Researchers have devised an attack against nearly all virtual private network applications...

ASCII art elicits harmful responses from 5 major AI chatbots

LLMs are trained to block harmful responses. Old-school images can override those rules. Researchers have discovered a new way to hack AI assistants that uses...

Security footage of Boeing repair before door-plug blowout was overwritten

NTSB: Boeing "unable to find the records documenting" repair work on 737 Max 9. A government investigation into a Boeing 737 Max 9 plane's door-plug...

Hackers can read private AI-assistant chats even though they’re encrypted

All non-Google chat GPTs affected by side channel that leaks responses sent to users. AI assistants have been widely available for a little more than...

Microsoft says Kremlin-backed hackers accessed its source and internal systems

Midnight Blizzard is now using stolen secrets in follow-on attacks against customers. Microsoft said that Kremlin-backed hackers who breached its corporate network in January have...

Attack wrangles thousands of web users into a password-password botnet

Ongoing attack is targeting thousands of sites, continues to grow. Attackers have transformed hundreds of hacked sites running WordPress software into command-and-control servers that force...

On DMA eve, Google whines, Apple sounds alarms, and TikTok wants out

DMA forces large platforms to give users more choices, rivals more chances. For months, some of the biggest tech companies have been wrapped up in...

Spotify wins as EU orders Apple to pay $2B and change App Store rules

Apple plans to appeal, insisting there's no evidence of consumer harms. The European Commission (EC) has sided with Spotify, fining Apple nearly $2 billion for abusive App...

WhatsApp finally forces Pegasus spyware maker to share its secret code

Israeli spyware maker loses fight to only share information on installation. WhatsApp will soon be granted access to explore the "full functionality" of the NSO...

Hugging Face, the GitHub of AI, hosted code that backdoored user devices

Malicious submissions have been a fact of life for code repositories. AI is no different. Code uploaded to AI developer platform Hugging Face covertly installed...
HomeCyber