Cyber

Hundreds of code libraries posted to NPM try to install malware on dev machines

These are not the the developer tools you think they are. Credit: Getty Images An ongoing attack is uploading hundreds of malicious packages to the open source node package manager (NPM)...

Android Trojan that intercepts voice calls to banks just got more stealthy

FakeCall malware can reroute calls intended for banks to attacker-controlled numbers. Credit: Getty Images Researchers have...

Systems used by courts and governments across the US riddled with vulnerabilities

With hundreds of courts and agencies affected, chances are one near you is, too. Public...

Hacker plants false memories in ChatGPT to steal user data in perpetuity

Emails, documents, and other untrusted content can plant malicious memories. When security researcher Johann Rehberger...

Google calls for halting use of WHOIS for TLS domain verifications

WHOIS data is unreliable. So why is it used in TLS certificate applications? Certificate authorities...

Attack wrangles thousands of web users into a password-password botnet

Ongoing attack is targeting thousands of sites, continues to grow. Attackers have transformed hundreds of hacked sites running WordPress software into command-and-control servers that force...

On DMA eve, Google whines, Apple sounds alarms, and TikTok wants out

DMA forces large platforms to give users more choices, rivals more chances. For months, some of the biggest tech companies have been wrapped up in...

Spotify wins as EU orders Apple to pay $2B and change App Store rules

Apple plans to appeal, insisting there's no evidence of consumer harms. The European Commission (EC) has sided with Spotify, fining Apple nearly $2 billion for abusive App...

WhatsApp finally forces Pegasus spyware maker to share its secret code

Israeli spyware maker loses fight to only share information on installation. WhatsApp will soon be granted access to explore the "full functionality" of the NSO...

Hugging Face, the GitHub of AI, hosted code that backdoored user devices

Malicious submissions have been a fact of life for code repositories. AI is no different. Code uploaded to AI developer platform Hugging Face covertly installed...

Judge mocks X for “vapid” argument in Musk’s hate speech lawsuit

Judge to X lawyer: “I’m trying to figure out in my mind how that’s possibly true." It looks like Elon Musk may lose X's lawsuit against...

How your sensitive data can be sold after a data broker goes bankrupt

Sensitive location data could be sold off to the highest bidder. In 2021, a company specializing in collecting and selling location data called Near bragged that it...

Vending machine error reveals secret face image database of college students

Facial-recognition data is typically used to prompt more vending machine sales. Canada-based University of Waterloo is racing to remove M&M-branded smart vending machines from campus...

“20 fake bank accounts opened in my name”: stolen identity turns into nightmare

Celia from Australia had a firsthand experience of the circles of hell that identity theft victims have to go through. Even years later, she...

Cryptocurrency maker sues former Ars reporter for writing about fraud lawsuit

Bitcoin Latinum angry about quotes from fraud lawsuit and Star Trek reference. The cryptocurrency firm Bitcoin Latinum has sued journalists at Forbes and Poker.org, claiming that the writers made...

Encrypted email service Skiff gets acquired, will shut down in six months

Skiff users will lose their @skiff.com email addresses, need to export data ASAP. Skiff, an encrypted email and productivity startup, is being acquired and shut...

The real threat to cybersecurity isn’t cybercrime, it’s burnout

Cybercrime poses a significant threat to industries and individuals alike. However, there are some less obvious but just as damaging issues that we need...

Ongoing campaign compromises senior execs’ Azure accounts, locks them using MFA

The wide range of employee roles targeted indicates attacker's multifaceted approach. Hundreds of Microsoft Azure accounts, some belonging to senior executives, are being targeted by...

There’s gonna be a Tesla ad full of lies at the Super Bowl but it isn’t Elon’s

There’s gonna be a Tesla ad full of lies that will play the Superbowl today, but it isn’t coming from Tesla. After years of resisting,...
HomeCyber