Summary

Total Articles Found: 39

Top sources:

Top Keywords:

Top Authors

Top Articles:

  • Hackers exploit bug in Elementor Pro WordPress plugin with 11M installs
  • Kaspersky releases free tool that scans Linux for known threats
  • A mishandled GitHub token exposed Mercedes-Benz source code
  • Russian-linked Android malware records audio, tracks your location
  • DuckDuckGo now blocks Google sign-in pop-ups on all sites
  • VMware: 70% drop in Linux ESXi VM performance with Retbleed fixes
  • New Android malware on Google Play installed 3 million times
  • Unpatched DNS bug affects millions of routers and IoT devices
  • Malicious VSCode extensions with 229M installs found on Microsoft marketplace
  • AI-Powered Malware Bypasses All Known Antivirus Solutions, Researchers Warn

Proton launches free, privacy-focused Google Docs alternative

Published: 2024-07-03 10:00:00

Popularity: 170

Author: Bill Toulas

Keywords:

  • Software
  • Cloud
  • Security
  • LLM Says: "Proton up!"

    Proton has launched 'Docs in Proton Drive,' a free and open-source end-to-end encrypted web-based document editing and collaboration tool. [...]

    ...more

    Malicious VSCode extensions with 229M installs found on Microsoft marketplace

    Published: 2024-06-09 14:22:26

    Popularity: 291

    Author: Bill Toulas

    Keywords:

  • Security
  • Microsoft
  • LLM Says: ""Extension Nightmare""

    A group of Israeli researchers exploring the limits of VSCode security have managed to "infect" over 100 organizations with a typosquatting Dracula extension that was weaponized with risky code. [...]

    ...more

    A mishandled GitHub token exposed Mercedes-Benz source code

    Published: 2024-01-30 18:42:13

    Popularity: 1756

    Author: Bill Toulas

    Keywords:

  • Security
  • A mishandled GitHub token gave unrestricted access to Mercedes-Benz's internal GitHub Enterprise Service, exposing source code to the public. [...]

    ...more

    New sandbox escape PoC exploit available for VM2 library, patch now

    Published: 2023-04-18 14:39:28

    Popularity: 55

    Author: Bill Toulas

    Keywords:

  • Security
  • Security researchers have released yet another sandbox escape proof of concept (PoC) exploit that makes it possible to execute unsafe code on the host running the VM2 sandbox. [...]

    ...more

    Hackers exploit bug in Elementor Pro WordPress plugin with 11M installs

    Published: 2023-03-31 15:52:33

    Popularity: 2522

    Author: Bill Toulas

    Keywords:

  • Security
  • Hackers are actively exploiting a high-severity vulnerability in the popular Elementor Pro WordPress plugin used by over eleven million websites. [...]

    ...more

    Google will boost Android security through firmware hardening

    Published: 2023-02-21 17:30:00

    Popularity: 67

    Author: Bill Toulas

    Keywords:

  • Security
  • Mobile
  • Google has presented a plan to strengthen the firmware security on secondary Android SoCs (systems on a chip) by introducing mechanisms like control flow integrity, memory safety systems, and compiler-based sanitizers. [...]

    ...more

    Critical flaws in WordPress Houzez theme exploited to hijack websites

    Published: 2023-02-27 18:19:20

    Popularity: 136

    Author: Bill Toulas

    Keywords:

  • Security
  • Hackers are actively exploiting two critical-severity vulnerabilities in the Houzez theme and plugin for WordPress, two premium add-ons used primarily in real estate websites. [...]

    ...more

    DuckDuckGo now blocks Google sign-in pop-ups on all sites

    Published: 2022-12-22 20:21:19

    Popularity: 1014

    Author: Bill Toulas

    Keywords:

  • Security
  • Google
  • DuckDuckGo apps and extensions are now blocking Google Sign-in pop-ups on all its apps and browser extensions, removing what it perceives as an annoyance and a privacy risk for its users. [...]

    ...more

    EarSpy attack eavesdrops on Android phones via motion sensors

    Published: 2022-12-27 13:39:20

    Popularity: 227

    Author: Bill Toulas

    Keywords:

  • Security
  • Mobile
  • A team of researchers has developed an eavesdropping attack for Android devices that can, to various degrees, recognize the caller's gender and identity, and even discern private speech. [...]

    ...more

    Malicious Android app found powering account creation service

    Published: 2022-11-28 22:52:53

    Popularity: 199

    Author: Bill Toulas

    Keywords:

  • Security
  • Google
  • Mobile
  • ​A fake Android SMS application, with 100,000 downloads on the Google Play store, has been discovered to secretly act as an SMS relay for an account creation service for sites like Microsoft, Google, Instagram, Telegram, and Facebook [...]

    ...more

    New ransomware encrypts files, then steals your Discord account

    Published: 2022-11-20 15:07:14

    Popularity: 186

    Author: Bill Toulas

    Keywords:

  • Security
  • The new 'AXLocker' ransomware family is not only encrypting victims' files and demanding a ransom payment but also stealing the Discord accounts of infected users. [...]

    ...more

    Massive cryptomining campaign abuses free-tier cloud dev resources

    Published: 2022-10-25 15:39:05

    Popularity: 39

    Author: Bill Toulas

    Keywords:

  • Security
  • CryptoCurrency
  • An automated and large-scale 'freejacking' campaign abuses free GitHub, Heroku, and Buddy services to mine cryptocurrency at the provider's expense. [...]

    ...more

    Cryptominers hijack $53 worth of system resources to earn $1

    Published: 2022-09-28 13:00:00

    Popularity: 167

    Author: Bill Toulas

    Keywords:

  • Security
  • Security researchers estimate that the financial impact of cryptominers infecting cloud servers costs victims about $53 for every $1 worth of cryptocurrency threat actors mine on hijacked devices. [...]

    ...more

    Signal calls on users to run proxies for bypassing Iran blocks

    Published: 2022-09-23 15:30:07

    Popularity: 150

    Author: Bill Toulas

    Keywords:

  • Security
  • Technology
  • Signal is urging its global community to help people in Iran stay connected with each other and the rest of the world by volunteering proxies to bypass the aggressive restrictions imposed by the Iranian regime. [...]

    ...more

    VMware: 70% drop in Linux ESXi VM performance with Retbleed fixes

    Published: 2022-09-12 15:33:02

    Popularity: 848

    Author: Bill Toulas

    Keywords:

  • Linux
  • Security
  • VMware is warning that ESXi VMs running on Linux kernel 5.19 can have up to a 70% performance drop when Retbleed mitigations are enabled compared to the Linux kernel 5.18 release. [...]

    ...more

    Firmware bugs in many HPE computer models left unfixed for over a year

    Published: 2022-09-11 14:12:16

    Popularity: 175

    Author: Bill Toulas

    Keywords:

  • Security
  • A set of six high-severity firmware vulnerabilities impacting a broad range of HP Enterprise devices are still waiting to be patched, although some of them were publicly disclosed since July 2021. [...]

    ...more

    GitLab ‘strongly recommends’ patching critical RCE vulnerability

    Published: 2022-08-24 19:15:24

    Popularity: 40

    Author: Bill Toulas

    Keywords:

  • Security
  • GitLab is urging users to install a security update for branches 15.1, 15.2, and 15.3 of its community and enterprise editions to fix a critical vulnerability that could enable an attacker to perform remote command execution via Github import. [...]

    ...more

    Windows malware delays coinminer install by a month to evade detection

    Published: 2022-08-29 17:19:02

    Popularity: 184

    Author: Bill Toulas

    Keywords:

  • Security
  • A new malware campaign disguised as Google Translate or MP3 downloader programs was found distributing cryptocurrency mining malware across 11 countries. [...]

    ...more

    Thousands of Solana wallets drained in attack using unknown exploit

    Published: 2022-08-03 11:26:27

    Popularity: 86

    Author: Bill Toulas

    Keywords:

  • Security
  • CryptoCurrency
  • An overnight attack on the Solana blockchain platform drained thousands of software wallets of cryptocurrency worth millions of U.S. dollars. [...]

    ...more

    Ex-Coinbase manager charged in first crypto insider-trading case

    Published: 2022-07-21 18:35:17

    Popularity: 27

    Author: Bill Toulas

    Keywords:

  • CryptoCurrency
  • Legal
  • The U.S. Department of Justice has charged a former Coinbase manager and two co-conspirators with wire fraud conspiracy and scheme to commit insider trading in cryptocurrency assets. [...]

    ...more

    New Android malware on Google Play installed 3 million times

    Published: 2022-07-13 15:00:33

    Popularity: 739

    Author: Bill Toulas

    Keywords:

  • Security
  • Google
  • Mobile
  • A new Android malware family on the Google Play Store that secretly subscribes users to premium services was downloaded over 3,000,000 times. [...]

    ...more

    Hackers can unlock Honda cars remotely in Rolling-PWN attacks

    Published: 2022-07-11 22:10:14

    Popularity: 231

    Author: Bill Toulas

    Keywords:

  • Security
  • A team of security researchers found that several modern Honda car models have a vulnerable rolling code mechanism that allows unlocking the cars or even starting the engine remotely. [...]

    ...more

    Amazon fixes high-severity vulnerability in Android Photos app

    Published: 2022-06-29 11:00:00

    Popularity: 48

    Author: Bill Toulas

    Keywords:

  • Security
  • Mobile
  • Amazon has confirmed and fixed a vulnerability in its Photos app for Android, which has been downloaded over 50 million times on the Google Play Store. [...]

    ...more

    Critical Jupiter WordPress plugin flaws let hackers take over sites

    Published: 2022-05-18 21:12:57

    Popularity: 84

    Author: Bill Toulas

    Keywords:

  • Security
  • WordPress security analysts have discovered a set of vulnerabilities impacting the Jupiter Theme and JupiterX Core plugins for WordPress, one of which is a critical privilege escalation flaw. [...]

    ...more

    Unpatched DNS bug affects millions of routers and IoT devices

    Published: 2022-05-03 13:18:54

    Popularity: 735

    Author: Bill Toulas

    Keywords:

  • Security
  • A vulnerability in the domain name system (DNS) component of a popular C standard library that is present in a wide range of IoT products may put millions of devices at DNS poisoning attack risk. [...]

    ...more

    Ubuntu 22.04 LTS released with performance and security improvements

    Published: 2022-04-22 13:18:58

    Popularity: 146

    Author: Bill Toulas

    Keywords:

  • Linux
  • Software
  • Canonical has announced the general availability of version 22.04 of the Ubuntu Linux distribution, codenamed 'Jammy Jellyfish', which brings better hardware support and an improved security baseline. [...]

    ...more

    Critical flaw in Elementor WordPress plugin may affect 500k sites

    Published: 2022-04-13 14:51:05

    Popularity: 257

    Author: Bill Toulas

    Keywords:

  • Security
  • The authors of the Elementor Website Builder plugin for WordPress have just released version 3.6.3 to address a critical remote code execution flaw that may impact as many as 500,000 websites. [...]

    ...more

    Russian-linked Android malware records audio, tracks your location

    Published: 2022-04-01 19:41:29

    Popularity: 1129

    Author: Bill Toulas

    Keywords:

  • Security
  • A previously unknown Android malware has been linked to the Turla hacking group after discovering the app used infrastructure previously attributed to the threat actors. [...]

    ...more

    Hacking group 'ModifiedElephant' evaded discovery for a decade

    Published: 2022-02-10 20:02:17

    Popularity: 85

    Author: Bill Toulas

    Keywords:

  • Security
  • Threat analysts have linked a decade of activity to an APT (advanced persistent threat) actor called 'ModifiedElephant', who has managed to remain elusive to all threat intelligence firms since 2012. [...]

    ...more

    Swiss army bans all chat apps but locally-developed Threema

    Published: 2022-01-06 16:02:00

    Popularity: 179

    Author: Bill Toulas

    Keywords:

  • Security
  • Software
  • The Swiss army has banned foreign instant-messaging apps such as Signal, Telegram, and WhatsApp and requires army members to use the locally-developed Threema messaging app instead. [...]

    ...more

    Hackers use in-house Zoho ServiceDesk exploit to drop webshells

    Published: 2021-12-02 17:37:27

    Popularity: 71

    Author: Bill Toulas

    Keywords:

  • Security
  • An advanced persistent threat (APT) group that had been exploiting a flaw in the Zoho ManageEngine ADSelfService Plus software has pivoted to leveraging a different vulnerability in another Zoho product. [...]

    ...more

    Fake end-to-end encrypted chat app distributes Android spyware

    Published: 2021-11-13 16:12:06

    Popularity: 168

    Author: Bill Toulas

    Keywords:

  • Security
  • The GravityRAT remote access trojan is being distributed in the wild again, this time under the guise of an end-to-end encrypted chat application called SoSafe Chat. [...]

    ...more

    Mozilla Thunderbird 91.3 released to fix high impact flaws

    Published: 2021-11-05 13:47:35

    Popularity: 121

    Author: Bill Toulas

    Keywords:

  • Security
  • ​Mozilla released  Thunderbird 91.3 to fix several high-impact vulnerabilities that can cause a denial of service, spoof the origin, bypass security policies, and allow arbitrary code execution. [...]

    ...more

    Over 30,000 GitLab servers still unpatched against critical bug

    Published: 2021-11-02 17:46:57

    Popularity: 107

    Author: Bill Toulas

    Keywords:

  • Security
  • A critical unauthenticated, remote code execution GitLab flaw fixed on April 14, 2021, remains exploitable, with over 50% of deployments remaining unpatched. [...]

    ...more

    WordPress plugin bug impacts 1M sites, allows malicious redirects

    Published: 2021-10-28 14:50:09

    Popularity: 76

    Author: Bill Toulas

    Keywords:

  • Security
  • The OptinMonster plugin is affected by a high-severity flaw that allows unauthorized API access and sensitive information disclosure on roughly a million WordPress sites. [...]

    ...more

    Medtronic urgently recalls insulin pump controllers over hacking concerns

    Published: 2021-10-06 14:48:56

    Popularity: 191

    Author: Bill Toulas

    Keywords:

  • Security
  • Medtronic is urgently recalling remote controllers for insulin pumps belonging to its 'MiniMed Paradigm' family of products, due to potential cybersecurity risks. [...]

    ...more

    Hackers use DNS tunneling for network scanning, tracking victims

    Published: 2024-05-13 17:50:06

    Popularity: 161

    Author: Bill Toulas

    Keywords:

  • Security
  • Threat actors are using Domain Name System (DNS) tunneling to track when their targets open phishing emails and click on malicious links, and to scan networks for potential vulnerabilities. [...]

    ...more

    Kaspersky releases free tool that scans Linux for known threats

    Published: 2024-06-01 15:17:34

    Popularity: 1837

    Author: Bill Toulas

    Keywords:

  • Software
  • Linux
  • Security
  • LLM Says: "Linux shield on"

    Kaspersky has released a new virus removal tool named KVRT for the Linux platform, allowing users to scan their systems and remove malware and other known threats for free. [...]

    ...more

    AI-Powered Malware Bypasses All Known Antivirus Solutions, Researchers Warn

    Published: 2024-06-09 14:22:26

    Popularity: 291

    Author: Bill Toulas

    Keywords:

  • Security
  • Microsoft
  • LLM Says: ""AI UhOh""

    Researchers have discovered "MalVAI," an AI-powered malware that can bypass all known antivirus solutions by constantly adapting its behavior and code to evade detection. This new threat highlights the obsolescence of traditional cybersecurity methods, prompting an urgent need for AI-driven defense mechanisms. Experts emphasize the necessity for the cybersecurity industry to innovate and develop dynamic solutions capable of evolving alongside sophisticated AI-driven attacks.

    ...more

    end