Cyber

Backdoor infecting VPNs used “magic packets” for stealth and security

J-Magic backdoor infected organizations in a wide array of industries. Credit: Getty Images When threat actors use backdoor malware to gain access to a network, they want to make sure all their...

Ongoing attacks on Ivanti VPNs install a ton of sneaky, well-written malware

In-the-wild attacks tamper with built-in security tool to suppress infection warnings. Credit: Getty Images Networks protected...

Time to check if you ran any of these 33 malicious Chrome extensions

Two separate campaigns have been stealing credentials and browsing history for months. Credit: Getty Images As...

Passkey technology is elegant, but it’s most definitely not usable security

Just in time for holiday tech-support sessions, here's what to know about passkeys. Credit: Getty...

Crypto scammers posing as real brands on X are easily hacking YouTubers

Fighting game YouTuber now fighting Google over “monstrous” post-hack revenue loss. Credit: via Capcom USA For months,...

Security flaws in court record systems used in five US states exposed sensitive legal documents

The vulnerabilities allowed public access to restricted, sealed and confidential court filings using only a web browser Image Credits: Bryce Durbin / TechCrunch Witness lists and testimony, mental health evaluations,...

ownCloud vulnerability with maximum 10 severity score comes under “mass” exploitation

Easy-to-exploit flaw can give hackers passwords and cryptographic keys to vulnerable servers. 20WITH Security researchers are tracking what they say is the “mass exploitation” of a...

Microsoft alerts CyberLink to North Korean threat

Microsoft has alerted software company CyberLink to the misuse of its software by North Korean group Diamond Sleet. The cyber gang is believed to...

MacOS targeted by ClearFake malware campaign

A data-stealing program that targets Mac operating systems (OS) is being distributed to unsuspecting targets by means of fake web browser updates, Malwarebytes has...

Thousands of routers and cameras vulnerable to new 0-day attacks by hostile botnet

Internet scans show 7,000 devices may be vulnerable. The true number could be higher. 31WITH Miscreants are actively exploiting two new zero-day vulnerabilities to wrangle routers...

Most cyberattacks in Russia come from China and North Korea

Good diplomatic relations do not necessarily extend to cyberspace, with the most devastating cyber attacks in Russia coming from its friends. China and North...

FBI warning on MGM hacker group Scattered Spider, urges victims to come forward

The FBI is warning organizations to guard against the Scattered Spider ransom group, which has already breached dozens of American firms over the past...

Pro-Hamas cybergang develops complex infection tactics with new downloader

A threat actor targeting West Asian governments now uses a labyrinthine infection chain based on delivering a new initial access downloader dubbed IronWind, cybersecurity...

In a first, cryptographic keys protecting SSH connections stolen in new attack

An error as small as a single flipped memory bit is all it takes to expose a private key. 120WITH For the first time, researchers have...

Frontegg Forward is here, allowing enterprises to securely manage their customers’ digital identities

VentureBeat presents: AI Unleashed - An exclusive executive event for enterprise data leaders. Network and learn with industry peers. Learn More Frontegg, the four-year-old startup focused on making...

Digital.ai launches Denali to help enterprises automate secure software releases

Credit: VentureBeat made with Midjourney VentureBeat presents: AI Unleashed - An exclusive executive event for enterprise data leaders. Network and learn with industry peers. Learn More Digital.ai,...

Google’s “Web Integrity” Android API could kill “alternative” media clients

Web Integrity pivots to Android, could permanently kill YouTube Vanced-style apps. 50WITH Google is killing off its proposal for "Web Environment Integrity API" as a new web standard,...

Critical vulnerability in Atlassian Confluence server is under “mass exploitation”

Atlassian's senior management is all but begging customers to take immediate action. 15WITH A critical vulnerability in Atlassian’s Confluence enterprise server app that allows for malicious...

Headhunt for 4 million cybersecurity pros: current shortage is largest ever

The gap between the demand for cybersecurity professionals and their availability has widened to unprecedented levels, says a new report. The number of new...
HomeCyber