Threats and Malware
Threats & Malware, Vulnerabilities
April 9, 2024
Via: TechRadarBack in January, we reported on a small security update patch for Windows 10 that brought on a lot of headaches for IT admins and brought on a veritable cavalcade of error codes. Microsoft promised a fix was in the […]
Threats & Malware, Vulnerabilities
April 9, 2024
Via: Security AffairsBitdefender researchers discovered multiple vulnerabilities in LG webOS running on smart TVs that could be exploited to bypass authorization and gain root access on the devices. The vulnerabilities discovered by the researchers impact WebOS versions 4 through 7 running on […]
April 8, 2024
Via: The RegisterHome Depot has confirmed that a third-party company accidentally exposed some of its employees’ personal details after a criminal copy-pasted the data online. In a statement to The Register, Home Depot spokesperson Beth Marlowe said: “A third-party SaaS vendor inadvertently […]
Threats & Malware, Vulnerabilities
April 8, 2024
Via: TechRadarMultiple generative AI models uploaded to Hugging Face were found to be vulnerable in a way that allowed threat actors to run malicious code and extract sensitive user information. This is according to a new report from the cloud security […]
April 4, 2024
Via: Security AffairsCity of Hope is a renowned cancer research and treatment center located in Duarte, California, United States. It is recognized for its comprehensive cancer care, innovative research, and compassionate patient support services. City of Hope suffered a data breach, the […]
Mobile, Mobile security, Threats & Malware, Vulnerabilities
April 3, 2024
Via: Security WeekThe exploited flaws, tracked as CVE-2024-29745 and CVE-2024-29748, impact Pixel’s bootloader and firmware, Google notes in its advisory. The internet giant says it has indications that these two security defects “may be under limited, targeted exploitation,” without providing specific details […]
Threats & Malware, Virus & Malware
April 1, 2024
Via: The Hacker NewsDespite a plethora of available security solutions, more and more organizations fall victim to Ransomware and other threats. These continued threats aren’t just an inconvenience that hurt businesses and end users – they damage the economy, endanger lives, destroy businesses […]
Threats & Malware, Virus & Malware
April 1, 2024
Via: Security AffairsJamf Threat Labs researchers analyzed info stealer malware attacks targeting macOS users via malicious ads and rogue websites. One of the attacks spotted by the researchers relied on sponsored ads proposed to the users while searching for “Arc Browser” on […]
Mobile, Mobile security, Threats & Malware, Virus & Malware
April 1, 2024
Via: The Hacker NewsThe Android banking trojan known as Vultur has resurfaced with a suite of new features and improved anti-analysis and detection evasion techniques, enabling its operators to remotely interact with a mobile device and harvest sensitive data. “Vultur has also started […]
March 29, 2024
Via: Security WeekIdentified on April 17, the attack impacted systems associated with Point32Health’s Harvard Pilgrim Health Care brand, including systems serving Harvard Pilgrim Health Care Commercial and Medicare Advantage Stride plans and “used to service members, accounts, brokers, and providers”. “The investigation […]
March 27, 2024
Via: DataBreach TodayCybercrooks are exploring ways to develop custom, malicious large language models after existing tools such as WormGPT failed to cater to their demands for advanced intrusion capabilities, security researchers said. Undergrounds forums teem with hackers’ discussions about how to exploit […]
Threats & Malware, Virus & Malware
March 27, 2024
Via: Security AffairsThe Black Lotus Labs team at Lumen Technologies uncovered an updated version of “TheMoon” bot targeting end-of-life (EoL) small home/small office (SOHO) routers and IoT devices. The new version of the bot has been spotted infecting thousands of outdated devices […]
Threats & Malware, Virus & Malware
March 26, 2024
Via: Naked SecurityThere are two main ways to recover encrypted data in a ransomware attack: restoring from backups and paying the ransom. Compromising an organization’s backups enables adversaries to restrict their victim’s ability to recover encrypted data and dial-up the pressure to […]
March 25, 2024
Via: The RegisterIf your Windows domain controllers have been crashing since a security update was installed earlier this month, there’s no longer any need to speculate why: Microsoft has admitted it introduced a memory leak in its March patches and fixed the […]
Hacker, Threats & Malware, Virus & Malware
March 25, 2024
Via: Security AffairsProofpoint researchers observed the Iran-linked APT group MuddyWater (aka SeedWorm, TEMP.Zagros, TA450, and Static Kitten) was behind a new phishing campaign in March 2024 that attempted to drop a legitimate Remote Monitoring and Management (RMM) solution called Atera on the […]
Threats & Malware, Virus & Malware
March 21, 2024
Via: Help Net Security93% of IT professionals believe security threats are increasing in volume or severity, a significant rise from 47% last year, according to Thales. The number of enterprises experiencing ransomware attacks surged by over 27% in the past year. Despite this […]
March 20, 2024
Via: Help Net SecurityData loss is a problem stemming from the interaction between humans and machines, and ‘careless users’ are much more likely to cause those incidents than compromised or misconfigured systems, according to Proofpoint. While organizations are investing in Data Loss Prevention […]
Cyber-crime, Malware, Threats & Malware, Vulnerabilities
March 20, 2024
Via: Security AffairsTrend Micro researchers are exploiting the recently disclosed vulnerabilities CVE-2024-27198 (CVSS score: 9.8) and CVE-2024-27199 (CVSS score 7.3) security flaws in JetBrains TeamCity to deploy multiple malware families and gain administrative control over impacted systems. In early March, Rapid7 researchers […]
March 19, 2024
Via: Security WeekMintlify helps developers generate code documentation. It requires access to the source code, such as GitHub repositories, to analyze it, understand its purpose, and create descriptions. In an incident notice on its website, the San Francisco-based company says that 91 […]
March 19, 2024
Via: Security AffairsThe Ukraine cyber police and the national police have arrested three individuals who are suspected to have hacked over 100 million emails and Instagram accounts worldwide and offered them for sale. The three men obtained the account credentials by carrying […]