Cyber

Hundreds of code libraries posted to NPM try to install malware on dev machines

These are not the the developer tools you think they are. Credit: Getty Images An ongoing attack is uploading hundreds of malicious packages to the open source node package manager (NPM)...

Android Trojan that intercepts voice calls to banks just got more stealthy

FakeCall malware can reroute calls intended for banks to attacker-controlled numbers. Credit: Getty Images Researchers have...

Systems used by courts and governments across the US riddled with vulnerabilities

With hundreds of courts and agencies affected, chances are one near you is, too. Public...

Hacker plants false memories in ChatGPT to steal user data in perpetuity

Emails, documents, and other untrusted content can plant malicious memories. When security researcher Johann Rehberger...

Google calls for halting use of WHOIS for TLS domain verifications

WHOIS data is unreliable. So why is it used in TLS certificate applications? Certificate authorities...

Xos’s medium-duty electric truck hits the road with Penske

In Penske Truck Leasing’s latest electrification move, it’s added Xos’s medium-duty electric trucks to its fleet. Penske has adopted the Xos Stepvan, a battery-electric Class 6...

Why Unity felt the need to “rush out” its controversial install-fee program

New report details internal divisions, intense push for mobile ad money. 96WITH FURTHER READING Unity makes major changes to controversial install-fee programIt's been over a month now...

Social media is drowning in misinformation on the Israel-Hamas conflict

Nobody is unbiased, all sides participate in some sort of propaganda, and social media is filled with misinformation, Dr. Roberto Mazza warns. No slickly...

Google Chrome mimicked to spread malware

Bogus browser updates that mimic notifications from Google Chrome, Mozilla Firefox, and Microsoft Edge are being increasingly used by criminals to install malware on...

Okta says hackers breached its support system and viewed customer files

Hackers obtained valid credentials, but Okta doesn't say how. 20WITH Identity and authentication management provider Okta said hackers managed to view private customer information after gaining...

Facebook copyright scam intensifies, users left stranded

The Facebook copyright infringement scam appears to have intensified, with users reporting being locked out of their accounts with little help from the Meta-owned...

Telegram, AWS users targeted by hidden malware code

Telegram, AWS, and Alibaba Cloud users are being targeted by a fresh malware campaign that strategically buries malicious code within specific software functions to...

YouTube is cracking down on adblock users: pay or disable

YouTube has introduced an anti-adblock feature, which alerts users with pop-ups and interrupts the viewing experience. The adblocking community is already working on ways...

Cloud gaming firm Shadow says hackers stole customers’ personal data

Image Credits: Shadow French technology company Shadow has confirmed a data breach involving customers’ personal information. The Paris-headquartered startup, which offers gaming through its cloud-based PC service, said...

Lakera launches to protect large language models from malicious prompts

With $10M in backing, Swiss startup launches API to protect companies from prompt injections and more Image Credits: Supatman / Getty Images Large language models (LLMs) are the driving...

Vulnerabilities in Supermicro BMCs could allow for unkillable server rootkits

With the ability to manage huge fleets of servers, BMCs are ideal places to stash malware. 66WITH If your organization uses servers that are equipped with...

Cybersecurity teams understaffed – report

A cybersecurity skills gap is leaving businesses vulnerable to attacks, a new study from ISACA warns. Businesses are experiencing more cyberattacks and recognize an increased...

European Standards Organization ETSI gets hacked, user data stolen

The European Telecommunications Standards Institute (ETSI) faced a cyberattack that allowed hackers to exfiltrate a database containing a list of online users, the organization...

MGM and Caesars-like phishing campaign continues targeting luxury hotels

Luxury hotels remain the major target of a “well-crafted and innovative” social engineering campaign, cybersecurity experts warn. The hospitality industry is still “very at risk”...
HomeCyber