Quantcast
Channel: do son, Author at Cybersecurity News
Browsing all 1971 articles
Browse latest View live

Google Pixel Phones Exposed: Millions at Risk Due to Pre-Installed App...

Cybersecurity researchers at iVerify, in collaboration with Palantir Technologies and Trail of Bits, have uncovered a significant vulnerability in millions of Google Pixel devices worldwide. The flaw,...

View Article


Save uBlock Origin: How to Bypass Google’s Chrome Update and Extend Support

Google Chrome has begun automatically detecting and warning users on the extensions page that Manifest v2-based extensions are nearing deprecation. Although these extensions have not yet been fully...

View Article


Windows Sandbox Gets Supercharged: Clipboard and File Sharing Arrive

Microsoft continues to refine its Windows 11 experience with the introduction of significant updates to the Windows Sandbox application in the latest Windows 11 Canary Build 27686. Designed as a... The...

View Article

WPS Office Vulnerabilities Expose 200 Million Users: CVE-2024-7262 Exploited...

WPS Office, a widely used office suite with a user base exceeding 200 million, has been found to contain two critical vulnerabilities that could expose users to remote code execution... The post WPS...

View Article

ZDI Details Copy2Pwn: Zero-Day CVE-2024-38213 Evades Windows Security Measures

Researchers at Trend Micro’s Zero Day Initiative (ZDI) published the technical details for a vulnerability in Windows, identified as CVE-2024-38213, which has exposed a critical flaw in the operating...

View Article


Windows 11 24H2: Microsoft Enforces Device Encryption by Default

The device encryption feature in Windows 10/11 was originally an optional function, with some OEMs enabling it on laptops and other devices to enhance security. Device encryption is based on... The...

View Article

Tusk Campaign: Russian Cybercriminals Target Gaming & Crypto

Kaspersky Lab has uncovered an international cyber campaign targeting the theft of cryptocurrency and personal data from Windows and macOS users worldwide. The campaign has been named “Tusk.” The...

View Article

Iranian APT42 Ramps Up Phishing Campaigns Against Israel, U.S. Election Targets

Google’s Threat Analysis Group (TAG) has issued a warning about APT42, an Iranian government-backed threat actor, and their escalating phishing campaigns aimed at high-profile individuals and...

View Article


Google Products Exploited in Sophisticated Malvertising Scheme

Cybersecurity researchers at Malwarebytes Labs have uncovered a sophisticated malvertising campaign targeting Google users. The scammers have brazenly impersonated Google’s entire product line, using...

View Article


Cybercriminals Evolve Social Engineering Tactics, Exploit CVE-2022-26923 in...

Recently, cybersecurity firm Rapid7 identified a series of sophisticated intrusion attempts linked to an ongoing social engineering campaign that has been actively monitored by its threat intelligence...

View Article

EDRKillShifter: A New EDR-Killing Tool in Ransomware Attack

Sophos researchers have discovered a new threat: EDRKillShifter, a sophisticated tool designed to dismantle endpoint detection and response (EDR) systems, the very software designed to thwart...

View Article

ValleyRAT Campaign Leverages Shellcode and Social Engineering to Target...

In a recent discovery by FortiGuard Labs, an ongoing cyber campaign has been identified, aggressively deploying the ValleyRAT malware to target Chinese-speaking users. The campaign has a particular...

View Article

CrowdSec: The Next-Generation Behavior Detection Engine for Enhanced...

In today’s rapidly evolving digital landscape, securing network infrastructures has never been more critical. With the rise of cloud computing, containerization, and virtual machine (VM)-based...

View Article


10,000+ WordPress Sites at Risk: Critical File Deletion Flaw Found in InPost...

A critical vulnerability, tracked as CVE-2024-6500 (CVSS 10), has been uncovered in two popular WordPress plugins, InPost PL and InPost for WooCommerce, leaving over 10,000 websites susceptible to...

View Article

Cyclops: Iranian APT 35 Hackers’ Latest Tool for Network Infiltration

Researchers have uncovered a new piece of malware named Cyclops, likely developed by the “Charming Kitten” group (APT 35). This malware first emerged in December 2023 and by 2024 had... The post...

View Article


Gafgyt Botnet: Now Exploiting GPU Power in Cloud-Native Environments

Researchers at Aqua Nautilus have identified a new variant of the Gafgyt botnet that represents a significant evolution in malware targeting strategies. Originally known for infecting IoT devices to...

View Article

Shimano Di2 Wireless Protocol: Critical Vulnerabilities Uncovered

Researchers from the University of California, San Diego, and Northeastern University have uncovered a potential vulnerability in wireless gear-shifting tools used by professional cyclists. This flaw...

View Article


BANSHEE Stealer: $3,000/Month macOS Malware Targets Apple Users

Security researchers warn of a new macOS malware, BANSHEE Stealer, which has recently emerged in underground forums. Developed by Russian threat actors and introduced on an underground forum, this...

View Article

Cloud Attack: Extortionists Breach AWS, Expose 90,000 Variables

Palo Alto Networks has uncovered a large-scale ransomware campaign that has impacted over 100,000 domains. The perpetrators exploited misconfigured ENV files in AWS to gain access to data stored in......

View Article

Ransomware Attacks Surge: $459 Million Paid in First Half of 2024

According to a new report, ransomware victims paid over $459 million to attackers in the first half of 2024. This staggering figure underscores the escalating cybersecurity crisis affecting...

View Article
Browsing all 1971 articles
Browse latest View live