Cyber

Ongoing attacks on Ivanti VPNs install a ton of sneaky, well-written malware

In-the-wild attacks tamper with built-in security tool to suppress infection warnings. Credit: Getty Images Networks protected by Ivanti VPNs are under active attack by well-resourced hackers who are exploiting a critical...

Time to check if you ran any of these 33 malicious Chrome extensions

Two separate campaigns have been stealing credentials and browsing history for months. Credit: Getty Images As...

Passkey technology is elegant, but it’s most definitely not usable security

Just in time for holiday tech-support sessions, here's what to know about passkeys. Credit: Getty...

Crypto scammers posing as real brands on X are easily hacking YouTubers

Fighting game YouTuber now fighting Google over “monstrous” post-hack revenue loss. Credit: via Capcom USA For months,...

Critical WordPress plugin vulnerability under active exploit threatens thousands

Vulnerability with severity rating of 9.8 out of possible 10 still live on >8,000...

Hackers discover how to reprogram NES Tetris from within the game

New method could help high-score chasers trying to avoid game-ending crashes. Earlier this year, we shared the story of how a classic NES Tetris player hit the game's "kill...

Novel attack against virtually all VPN apps neuters their entire purpose

TunnelVision vulnerability has existed since 2002 and may already be known to attackers. Researchers have devised an attack against nearly all virtual private network applications...

ASCII art elicits harmful responses from 5 major AI chatbots

LLMs are trained to block harmful responses. Old-school images can override those rules. Researchers have discovered a new way to hack AI assistants that uses...

Security footage of Boeing repair before door-plug blowout was overwritten

NTSB: Boeing "unable to find the records documenting" repair work on 737 Max 9. A government investigation into a Boeing 737 Max 9 plane's door-plug...

Hackers can read private AI-assistant chats even though they’re encrypted

All non-Google chat GPTs affected by side channel that leaks responses sent to users. AI assistants have been widely available for a little more than...

Microsoft says Kremlin-backed hackers accessed its source and internal systems

Midnight Blizzard is now using stolen secrets in follow-on attacks against customers. Microsoft said that Kremlin-backed hackers who breached its corporate network in January have...

Attack wrangles thousands of web users into a password-password botnet

Ongoing attack is targeting thousands of sites, continues to grow. Attackers have transformed hundreds of hacked sites running WordPress software into command-and-control servers that force...

On DMA eve, Google whines, Apple sounds alarms, and TikTok wants out

DMA forces large platforms to give users more choices, rivals more chances. For months, some of the biggest tech companies have been wrapped up in...

Spotify wins as EU orders Apple to pay $2B and change App Store rules

Apple plans to appeal, insisting there's no evidence of consumer harms. The European Commission (EC) has sided with Spotify, fining Apple nearly $2 billion for abusive App...

WhatsApp finally forces Pegasus spyware maker to share its secret code

Israeli spyware maker loses fight to only share information on installation. WhatsApp will soon be granted access to explore the "full functionality" of the NSO...

Hugging Face, the GitHub of AI, hosted code that backdoored user devices

Malicious submissions have been a fact of life for code repositories. AI is no different. Code uploaded to AI developer platform Hugging Face covertly installed...

Judge mocks X for “vapid” argument in Musk’s hate speech lawsuit

Judge to X lawyer: “I’m trying to figure out in my mind how that’s possibly true." It looks like Elon Musk may lose X's lawsuit against...

How your sensitive data can be sold after a data broker goes bankrupt

Sensitive location data could be sold off to the highest bidder. In 2021, a company specializing in collecting and selling location data called Near bragged that it...

Vending machine error reveals secret face image database of college students

Facial-recognition data is typically used to prompt more vending machine sales. Canada-based University of Waterloo is racing to remove M&M-branded smart vending machines from campus...
HomeCyber