Cyber

Hundreds of code libraries posted to NPM try to install malware on dev machines

These are not the the developer tools you think they are. Credit: Getty Images An ongoing attack is uploading hundreds of malicious packages to the open source node package manager (NPM)...

Android Trojan that intercepts voice calls to banks just got more stealthy

FakeCall malware can reroute calls intended for banks to attacker-controlled numbers. Credit: Getty Images Researchers have...

Systems used by courts and governments across the US riddled with vulnerabilities

With hundreds of courts and agencies affected, chances are one near you is, too. Public...

Hacker plants false memories in ChatGPT to steal user data in perpetuity

Emails, documents, and other untrusted content can plant malicious memories. When security researcher Johann Rehberger...

Google calls for halting use of WHOIS for TLS domain verifications

WHOIS data is unreliable. So why is it used in TLS certificate applications? Certificate authorities...

Passkeys: What They Are and Why You Need Them ASAP

We tell you what passkeys are, how you can get them, and where you can use them to log in securely without exposing your...

Apple And Cyber Startup Corellium Settle Four-Year Court Battle

After four years of court hearings and plenty of controversy, Apple and cyber startup Corellium are settling a copyright lawsuit. Terms have not been...

U.S, U.K. And 16 Other Nations Agree On AI Security Guidelines

Eighteen countries have signed an agreement on AI safety, based on the principle that it should be secure by design. The Guidelines for Secure AI System...

Google agrees to settle Chrome incognito

2020 lawsuit accused Google of tracking incognito activity, tying it to users' profiles. Google has indicated that it is ready to settle a class-action lawsuit filed in...

Big Tech’s divisive ‘personalization’ attracts fresh call for profiling-based content feeds to be off by default in EU

Image Credits: Jake O'Limb / PhotoMosh / Getty Images Another policy tug-of-war could be emerging around Big Tech’s content recommender systems in the European Union where the Commission...

CircleCI warns customers to rotate ‘any and all secrets’ after hack

Image Credits: Boris Zhitkov (opens in a new window)/ Getty Images CircleCI, a company whose development products are popular with software engineers, has urged users to rotate their...

Apple releases security updates for iOS, iPadOS and macOS, fixing two actively exploited zero-days

Apple has released security updates for iPhones, iPads and Macs to patch against two vulnerabilities, which the company says are being actively exploited to...

Security flaws in court record systems used in five US states exposed sensitive legal documents

The vulnerabilities allowed public access to restricted, sealed and confidential court filings using only a web browser Image Credits: Bryce Durbin / TechCrunch Witness lists and testimony, mental health evaluations,...

ownCloud vulnerability with maximum 10 severity score comes under “mass” exploitation

Easy-to-exploit flaw can give hackers passwords and cryptographic keys to vulnerable servers. 20WITH Security researchers are tracking what they say is the “mass exploitation” of a...

Microsoft alerts CyberLink to North Korean threat

Microsoft has alerted software company CyberLink to the misuse of its software by North Korean group Diamond Sleet. The cyber gang is believed to...

MacOS targeted by ClearFake malware campaign

A data-stealing program that targets Mac operating systems (OS) is being distributed to unsuspecting targets by means of fake web browser updates, Malwarebytes has...

Thousands of routers and cameras vulnerable to new 0-day attacks by hostile botnet

Internet scans show 7,000 devices may be vulnerable. The true number could be higher. 31WITH Miscreants are actively exploiting two new zero-day vulnerabilities to wrangle routers...

Most cyberattacks in Russia come from China and North Korea

Good diplomatic relations do not necessarily extend to cyberspace, with the most devastating cyber attacks in Russia coming from its friends. China and North...

FBI warning on MGM hacker group Scattered Spider, urges victims to come forward

The FBI is warning organizations to guard against the Scattered Spider ransom group, which has already breached dozens of American firms over the past...
HomeCyber