Today's Core Dump is brought to you by ThreatPerspective

Biz & IT Ars Technica

Researchers spot cryptojacking attack that disables endpoint protections

A key component: Installing known vulnerable drivers from Avast and IOBit.

Researchers spot cryptojacking attack that disables endpoint protections
Enlarge (credit: Getty Images)

Malware recently spotted in the wild uses sophisticated measures to disable antivirus protections, destroy evidence of infection, and permanently infect machines with cryptocurrency-mining software, researchers said Tuesday. Key to making the unus...

Published: 2024-05-21T19:14:55



Biz & IT Ars Technica

Linux maintainers were infected for 2 years by SSH-dwelling backdoor with huge reach

Ebury backdoors SSH servers in hosting providers, giving the malware extraordinary reach.

A cartoon door leads to a wall of computer code.
Enlarge (credit: BeeBright / Getty Images / iStockphoto)

Infrastructure used to maintain and distribute the Linux operating system kernel was infected for two years, starting in 2009, by sophisticated malware that managed to get a hold of one of the developers’ most closely guarded resources: the /etc/s...

Published: 2024-05-15T16:56:03



Biz & IT Ars Technica

Black Basta ransomware group is imperiling critical infrastructure, groups warn

Threat group has targeted 500 organizations. One is currently struggling to cope.

Black Basta ransomware group is imperiling critical infrastructure, groups warn
Enlarge (credit: Getty Images)

Federal agencies, health care associations, and security researchers are warning that a ransomware group tracked under the name Black Basta is ravaging critical infrastructure sectors in attacks that have targeted more than 500 organizations in th...

Published: 2024-05-13T19:55:52



Biz & IT Ars Technica

Google patches its fifth zero-day vulnerability of the year in Chrome

Exploit code for critical "use-after-free" bug is circulating in the wild.

Extreme close-up photograph of finger above Chrome icon on smartphone.
Enlarge (credit: Getty Images)

Google has updated its Chrome browser to patch a high-severity zero-day vulnerability that allows attackers to execute malicious code on end user devices. The fix marks the fifth time this year the company has updated the browser to protect users ...

Published: 2024-05-10T17:02:14



Biz & IT Ars Technica

Critical vulnerabilities in BIG-IP appliances leave big networks open to intrusion

Hackers can exploit them to gain full administrative control of internal devices.

Critical vulnerabilities in BIG-IP appliances leave big networks open to intrusion
Enlarge (credit: Getty Images)

Researchers on Wednesday reported critical vulnerabilities in a widely used networking appliance that leaves some of the world’s biggest networks open to intrusion. The vulnerabilities reside in BIG-IP Next Central Manager, a component in the late...

Published: 2024-05-08T21:35:08



The Verge - Securities

The EPA is cracking down on cybersecurity threats

A collection of warning signs, bugs, and notifications emulating malware or a cyber attack. The images are placed in a connected web against a blue background.
Illustration by Carlo Cadenas / The Verge

The Environmental Protection Agency is ramping up its inspections of critical water infrastructure after warning of “alarming vulnerabilities” to cyberattacks. The agency issued an enforcement alert yesterday warning utilities to take quick...

Published: 2024-05-21T10:34:19



The Verge - Securities

Google thinks the public sector can do better than Microsoft s security failures

Illustration of a key being pixelated.
Illustration by Cath Virginia / The Verge | Photo from Getty Images

Google is pouncing on Microsoft’s weathered enterprise security reputation by pitching its services to government institutions. Pointing to a recent report from the US Cyber Safety Review Board (CSRB) that found that Microsoft’s security wo...

Published: 2024-05-20T14:01:20



The Verge - Securities

Election officials are role-playing AI threats to protect democracy

Arizona Secretary of State Chief Information Security Officer Michael Moore Photo by Ash Ponders for The Verge
Michael Moore, the chief information security officer for the Arizona secretary of state, said that title encompasses a greater range of threats than it used to.

Meanwhile, election officials are doing more with less. This isn’t by choice. Unprecedented scrutiny and outright harassment of election officials during the 2020 election have contributed to significant turnover in election workers. Giuliani...

Published: 2024-05-20T08:00:00



The Verge - Securities

Two students find security bug that could let millions do laundry for free

A collection of warning signs, bugs, and notifications emulating malware or a cyber attack. The images are placed in a connected web against a blue background.
Illustration by Carlo Cadenas / The Verge

A security lapse could let millions of college students do free laundry, thanks to one company. That’s because of a vulnerability that two University of California, Santa Cruz students found in internet-connected washing machines in commerc...

Published: 2024-05-19T19:57:03



The Verge - Securities

Single-tap passkeys are coming to Android 15

Screenshot of passkeys on Wear OS 5 Screenshot: Google
Wear OS 5 will also get passkey support.

Another neat update is it’ll get easier to log back in to your apps if you buy a new device thanks to a new “Restore” passkey feature for phones and tablets. An app will be able to save a restore key to Credential Manager. That key is then st...

Published: 2024-05-17T11:22:25



The Verge - Securities

Android will be able to detect if your phone has been snatched

Screenshot of theft detection. Image: Google
A new feature aims to detect when a thief has taken your phone offline and locks the device.

Android 15 also introduces new security features, including “private spaces,” which let you put apps and information in a separate hidden area on your phone that can be locked with a unique PIN. Google is also adding protections for when a ph...

Published: 2024-05-15T13:00:00



The Verge - Securities

Android is getting an AI-powered scam call detection feature

An Android notification warning users of suspected scamming activities during calls. Image: Google
Here’s an example of the notification that users will receive during suspicious calls, giving the option to either continue the call or swiftly end it.

There’s no word on when the scam detection feature will be available, but Google says users will need to opt in to utilize it and that it’ll share more information “later this year.” While scam calls may seem easily detectable to some after y...

Published: 2024-05-14T13:57:28



The Verge - Securities

Tile owner Life360 picks satellites over partnering with Apple or Google

Colorful Tile Pro hanging from a key ring on a hook
Life360 owns Tile, which makes popular location trackers like the Tile Pro. | Photo by Victoria Song / The Verge

Tile is promising satellite connectivity for its Bluetooth trackers in a move that could boost the company as an independent alternative to its Big Tech rivals: Apple’s Find My network and Google’s newly revamped Find My Device network. Lif...

Published: 2024-05-13T13:55:26



The Verge - Securities

US indicts LockBit ransomware ringleader, offers $10 million reward

 Image: UK National Crime Agency
US and UK authorities seized LockBit’s data leak site in February.

LockBit operates using a ransomware-as-a-service model, allowing bad actors to purchase or rent ransomware to deploy it against victims. The ransomware has been linked to the high-profile attacks on the UK’s Royal Mail service, a children’s h...

Published: 2024-05-07T17:59:49



The Verge - Securities

Yubico bolsters authentication security with updated YubiKey 5 series devices

Someone using the YubiKey 5 NFC to access a laptop.
Users will need to buy new versions of products like the YubiKey 5 NFC (pictured) to benefit from the firmware update. | Image: Yubico

Yubico is getting ready to launch refreshed versions of its YubiKey 5, Security Key, and Security Key Enterprise Edition series authentication hardware that aim to help organizations move away from password-based protections. On Monday, the...

Published: 2024-05-07T06:25:30



BleepingComputer

State hackers turn to massive ORB proxy networks to evade detection

Security researchers are warning that China-linked state-backed hackers are increasingly relying on vast proxy networks of virtual private servers and compromised connected devices for cyberespionage operations. [...]

Published: 2024-05-22T13:37:48



BleepingComputer

Chinese hackers hide on military and govt networks for 6 years

A previously unknown threat actor dubbed "Unfading Sea Haze" has been targeting military and government entities in the South China Sea region since 2018, remaining undetected all this time. [...]

Published: 2024-05-22T09:25:37



BleepingComputer

GhostEngine mining attacks kill EDR security using vulnerable drivers

A malicious crypto mining campaign codenamed 'REF4578,' has been discovered deploying a malicious payload named GhostEngine that uses vulnerable drivers to turn off security products and deploy an XMRig miner. [...]

Published: 2024-05-21T18:30:19



BleepingComputer

LockBit says they stole data in London Drugs ransomware attack

Today, the LockBit ransomware gang claimed they were behind the April cyberattack on Canadian pharmacy chain London Drugs and is now threatening to publish stolen data online after allegedly failed negotiations. [...]

Published: 2024-05-21T17:23:42



The Register - Security

Veeam says critical flaw can't be abused to trash backups

It's still a rough one, so patch up Veeam says the recent critical vulnerability in its Backup Enterprise Manager (VBEM) can't be used by cybercriminals to delete an organization's backups.

Published: 2024-05-23T14:30:07



The Register - Security

70% of CISOs worry their org is at risk of a material cyber attack

Wait, why do you want this job again? Chief information security officers around the globe "are nervously looking over the horizon," according to a survey of 1,600 CISOs that found more than two thirds (70 percent) worry their organization is at risk of a material cyber attack over the next 12 months.

Published: 2024-05-23T13:30:07



The Register - Security

UK data watchdog wants six figures from N Ireland cops after 2023 data leak

Massive discount applied to save cop shop s helicopter budget Following a data leak that brought "tangible fear of threat to life", the UK's data protection watchdog says it intends to fine the Police Service of Northern Ireland (PSNI) 750,000 ($955,798).

Published: 2024-05-23T08:30:13



The Register - Security

How Apple Wi-Fi Positioning System can be abused to track people around the globe

SpaceX is smart on this, Cupertino and GL.iNet not so much In-depth Academics have suggested that Apple's Wi-Fi Positioning System (WPS) can be abused to create a global privacy nightmare.

Published: 2024-05-23T06:34:09



The Register - Security

Would you buy Pegasus spyware from this scammer?

You shouldn't Indian infosec researchers warn you'll get random junk instead Indian infosec firm CloudSEK warned on Wednesday that scammers are selling counterfeit code advertised as the NSO Group's notorious Pegasus spyware.

Published: 2024-05-23T05:45:07



The Register - Security

'China-aligned' spyware slingers operating since 2018 unmasked at last

Unfading Sea Haze adept at staying under the radar Bitdefender says it has tracked down and exposed an online gang that has been operating since 2018 nearly without a trace and likely working for Chinese interests.

Published: 2024-05-23T03:47:12



The Register - Security

Lawmakers advance bill to tighten White House grip on AI model exports

Vague ML definitions subject to change yeah, great The House Foreign Affairs Committee voted Wednesday to advance a law bill expanding the White House's authority to police exports of AI systems including models said to pose a national security threat to the United States.

Published: 2024-05-23T00:16:09



The Register - Security

Go after UnitedHealth, not us, 100+ medical groups urge Uncle Sam

Why should we get its paperwork? More than 100 medical industry groups have asked the Feds to make UnitedHealth Group, not them, go through the rigmarole of notifying everyone about the Change Healthcare ransomware infection.

Published: 2024-05-22T22:05:14



The Register - Security

Canada's London Drugs confirms ransomware attack after LockBit demands $25M

Pharmacy says it's 'unwilling and unable to pay ransom' Canadian pharmacy chain London Drugs has confirmed that ransomware thugs stole some of its corporate files containing employee information and says it is "unwilling and unable to pay ransom to these cybercriminals."

Published: 2024-05-22T20:00:10



The Register - Security

NYSE parent gets $10M wrist tap for failing to report 2021 systems break-in

Intercontinental Exchange's Q1 revenue exceeded $1B that'll sure teach 'em The New York Stock Exchange's parent company has just been hit with a $10 million fine for failing to properly inform the Securities and Exchange Commission (SEC) of a 2021 cyber intrusion.

Published: 2024-05-22T19:30:13



The Register - Security

Laundering cash from healthcare, romance scams lands US man in prison for a decade

$4.5M slushed through accounts from state healthcare and lonely people Georgia resident Malachi Mullings received a decade-long sentence for laundering money scored in scams against healthcare providers, private companies, and individuals to the tune of $4.5 million.

Published: 2024-05-22T18:00:10



The Register - Security

Confused by the SEC's IT security breach reporting rules? Read this

'Clarification' weighs in on material vs voluntary disclosures The US Securities and Exchange Commission (SEC) wants to clarify guidelines for public companies regarding the disclosure of ransomware and other cybersecurity incidents.

Published: 2024-05-22T16:30:13



The Register - Security

Stopping ransomware in multicloud environments

Attend this Register live event to learn how Sponsored Survey and Live Event What are the biggest risks to your organization posed by ransomware and what security defenses does it have in place to protect its sensitive data from cyber criminals?

Published: 2024-05-22T15:03:13



The Register - Security

LockBit dethroned as leading ransomware gang for first time post-takedown

Rivals ready to swoop in but drop in overall attacks illustrates LockBit s influence The takedown of LockBit in February is starting to bear fruit for rival gangs with Play overtaking it after an eight-month period of LockBit topping the attack charts.

Published: 2024-05-22T11:00:11



The Register - Security

GitHub Enterprise Server patches 10-outta-10 critical hole

On the bright side, someone made up to $30,000+ for finding it GitHub has patched its Enterprise Server software to fix a security flaw that scored a 10 out of 10 CVSS severity score.

Published: 2024-05-22T07:31:09



The Register - Security

Uncle Sam to inject $50M into auto-patcher for hospital IT

Boffins, why not simply invent an algorithm that autonomously fixes flaws, thereby ending ransomware forever The US government's Advanced Research Projects Agency for Health (ARPA-H) has pledged more than $50 million to fund the development of technology that aims to automate the process of securing hospital IT environments.

Published: 2024-05-22T00:46:12



The Register - Security

Zoom adds 'post-quantum' encryption for video nattering

Guess we all have imaginary monsters to fear Zoom has rolled out what it claims is post-quantum end-to-end encryption (E2EE) for video conferencing, saying it will make it available for Phone and Rooms "soon."

Published: 2024-05-21T19:45:13



The Register - Security

Critical Fluent Bit bug affects all major cloud providers, say researchers

Crashes galore, plus especially crafty crims could use it for much worse Infosec researchers are alerting the industry to a critical vulnerability in Fluent Bit a logging component used by a swathe of blue chip companies and all three major cloud providers.

Published: 2024-05-21T17:45:15



The Register - Security

With ransomware whales becoming so dominant, would-be challengers ask 'what's the point?'

Fewer rivals on the scene as big-gang success soars The number of new ransomware strains in circulation has more than halved over the past 12 months, suggesting there is little need for innovation given the success of the existing tools used by top gangs.

Published: 2024-05-21T11:01:32



The Register - Security

Big Tech is not much help when fighting a junta, and FOSS doesn't ride to the rescue

Opponents of Myanmar s internet-nobbling military government don't like when Facebook asks for their real names Big Tech isn't much help if you're an activist trying to work against a military junta, and FOSS tools aren't a great alternative either, according to opponents of Myanmar's military regime.

Published: 2024-05-21T03:35:14



The Register - Security

OpenSSF sings a Siren song to steer developers away from buggy FOSS

New infosec intelligence service aims to spread the word about recently discovered vulns in free code Securing open source software may soon become a little bit easier thanks to a new vulnerability info-sharing effort initiated by the Open Source Security Foundation (OpenSSF).

Published: 2024-05-20T23:06:10



The Register - Security

Julian Assange can appeal extradition to the US, London High Court rules

Let me go, Brandon WikiLeaks founder Julian Assange can appeal his extradition to the US from the UK, the High Court of England and Wales ruled Monday.

Published: 2024-05-20T22:05:24



The Register - Security

Google takes shots at Microsoft for shoddy security record with enterprise apps

Also, feds who switch to Google Workspace for 3 years get an extra year for free Updated Google has taken a victory lap in the wake of high-profile intrusions into Microsoft's systems, and says businesses should ditch Exchange and OneDrive for Gmail and Google Drive.

Published: 2024-05-20T17:47:10



The Register - Security

Can I phone a friend? How cops circumvent face recognition bans

Just ask a pal in a neighboring town with laxer restrictions Updated Police in multiple major US cities have figured out a trick to circumvent bans on facial recognition technology. Just ask a friend in a city without any such restrictions to do it for you.

Published: 2024-05-20T16:13:05



The Register - Security

Researchers call out QNAP for dragging its heels on patch development

WatchTowr publishes report claiming vendor failed to issue fixes after four months Infosec boffins say they were forced to go public after QNAP failed to fix various vulnerabilities that were reported to it months ago.

Published: 2024-05-20T14:00:12



The Register - Security

DoJ, ByteDance ask court: Hurry up and rule on TikTok ban already

Forced selloff case will likely be appealed again ... see you in (Supreme) court The US Department of Justice and Bytedance spent a rare moment unified on Friday when the duo asked for a fast-tracked court schedule for the Chinese short video apps divest or ban case.

Published: 2024-05-20T13:30:09



The Register - Security

British Library's candid ransomware comms driven by 'emotional intelligence'

It quickly realized dry progress updates weren t cutting it CyberUK Emotional intelligence was at the heart of the British Library's widely hailed response to its October ransomware attack, according to CEO Roly Keating.

Published: 2024-05-20T09:32:09



The Register - Security

Chinese telco gear may become verboten on German networks

Industry reportedly pressuring digital ministry not to cut the cord Germany may soon remove Huawei and ZTE equipment from its 5G networks, according to media reports.

Published: 2024-05-20T06:28:14



The Register - Security

Nissan infosec in the spotlight again after breach affecting more than 50K US employees

PLUS: Connected automakers put on notice; Cisco Talos develops macOS fuzzing technique; Last week's critical vulns Infosec in brief Nissan has admitted to another data loss this time involving the theft of personal information belonging to more than 50,000 Nissan employees.

Published: 2024-05-20T02:28:11



The Register - Security

An attorney says she saw her library reading habits reflected in mobile ads. That's not supposed to happen

Follow us down this deep rabbit hole of privacy policy after privacy policy Feature In April, attorney Christine Dudley was listening to a book on her iPhone while playing a game on her Android tablet when she started to see in-game ads that reflected the audiobooks she recently checked out of the San Francisco Public Library.

Published: 2024-05-18T17:04:10



The Register - Security

Gawd, after that week, we wonder what's next for China and the Western world

For starters: Crypto, import tariffs, and Microsoft shipping out staff Kettle It's been a fairly troubling week in terms of the relationship between China and the Western world.

Published: 2024-05-18T12:35:12



The Register - Security

How two brothers allegedly swiped $25M in a 12-second Ethereum heist

Feds scoff at blockchain integrity while software bug said to have been at heart of the matter The US Department of Justice has booked two brothers on allegations that they exploited open source software used in the Ethereum blockchain world to bag $25 million ( 20 million).

Published: 2024-05-18T06:29:07



The Register - Security

Aussie cops probe MediSecure's 'large-scale ransomware data breach'

Throw another healthcare biz on the barby, mate Australian prescriptions provider MediSecure is the latest healthcare org to fall victim to a ransomware attack, with crooks apparently stealing patients' personal and health data.

Published: 2024-05-17T23:31:14



The Register - Security

Three cuffed for 'helping North Koreans' secure remote IT jobs in America

Your local nail tech could be a secret agent for Kim s cunning plan Three individuals accused of helping North Korea fund its weapons programs using US money are now in handcuffs.

Published: 2024-05-17T18:34:11



The Register - Security

First LockBit, now BreachForums: Are cops winning the war or just a few battles?

TLDR: Peace in our time is really really hard Interview On Wednesday the FBI and international cops celebrated yet another cybercrime takedown of ransomware brokerage site BreachForums just a week after doxing and imposing sanctions on the LockBit ransomware crew's kingpin, and two months after compromising the gang's website.

Published: 2024-05-17T11:37:11



The Register - Security

Crims abusing Microsoft Quick Assist to deploy Black Basta ransomware

Spoiler alert: it's not really IT support controlling your device A cybercrime gang has been abusing Microsoft's Quick Assist application in social engineering attacks that ultimately allow the crew to infect victims with Black Basta ransomware.

Published: 2024-05-16T23:30:05



The Register - Security

EU probes Meta over its provisions for protecting children

Has social media biz done enough to comply with Digital Services Act? Maybe not The European Commission has opened formal proceedings to assess whether Meta, the provider of Facebook and Instagram, may have breached the Digital Services Act (DSA) in areas linked to the protection of minors.

Published: 2024-05-16T15:45:12



The Register - Security

Stifling Beijing in cyberspace is now British intelligence s number-one mission

Annual conference of cyber intel unit shows UK's alarm over China blaring louder than ever CyberUK Regular attendees of CYBERUK, the annual conference hosted by British intelligence unit the National Cyber Security Centre (NCSC), will know that in addition to the expected conference panels, there is usually an interwoven theme to proceedings.

Published: 2024-05-16T14:45:07



The Register - Security

NCSC CTO: Broken market must be fixed to usher in new tech

It may take ten years but vendors must be held accountable for the vulnerabilities they introduce CYBERUK National Cyber Security Centre (NCSC) CTO Ollie Whitehouse kicked off day two of Britain's cyber watchdog's annual shindig, CYBERUK, with a tirade about the tech market, pulling it apart to demonstrate why he believes it's at fault for many of the security problems the industry is facing today.

Published: 2024-05-16T09:33:06



The Register - Security

FBI takes down BreachForums ransomware website and Telegram channel

No more illicit gains, for a while at least The FBI, in combination with police around the world, have taken control of the website and Telegram channel of ransomware brokerage site BreachForums.

Published: 2024-05-15T22:31:28



The Register - Security

Crook brags about US Army and $75B defense biz pwnage

More government data allegedly stolen by prolific criminals An extortionist claims to have stolen files from the US Army Aviation and Missile Command in August 2023, and now claims they are selling access to a $75 billion aerospace and defense company.

Published: 2024-05-15T22:30:13



The Register - Security

Improving cyber defense with open source SIEM and XDR

Developing an effective strategy is a continuous process which requires recurring evaluation and refinement Partner Content A cyber defense strategy outlines policies, procedures, and technologies to prevent, detect, and respond to cyber attacks. This helps avoid financial loss, reputational damage, and legal repercussions.

Published: 2024-05-15T17:10:07



The Register - Security

Microsoft fixes a bug abused in QakBot attacks plus a second under exploit

Plus: Google Chrome, Apple bugs also exploited in the wild Happy May Patch Tuesday. We've got a lot of vendors joining this month's patchapalooza, which includes a handful of bugs that have been exploited either in the wild or at Pwn2Own and now fixed by Microsoft, Apple, Google and VMware.

Published: 2024-05-14T22:15:13



The Register - Security

FCC names and shames Royal Tiger AI robocall crew

Agency is on the lookout for a Prince among men The US Federal Communications Commission has named its first robocall gang, dubbing the crew "Royal Tiger," and detailed its operations in an attempt to encourage international action against the scammers.

Published: 2024-05-14T21:30:13



The Register - Security

Cybersec chiefs team up with insurers to say 'no' to ransomware bullies

Guidebook aims to undermine the criminal business model The latest effort to reduce the number of ransom payments sent to cybercriminals in the UK involves the country's National Cyber Security Centre (NCSC) locking arms with insurance associations.

Published: 2024-05-14T16:15:10



The Register - Security

Telegram CEO calls out rival Signal, claiming it has ties to US government

Drama between two of the leading secure messaging services Telegram CEO Pavel Durov issued a scathing criticism of Signal, alleging the messaging service is not secure and has ties to US intelligence agencies.

Published: 2024-05-14T14:30:13



The Register - Security

Google, Apple gear to raise tracking tag stalker alarm

After years of people being victimized, it's about time Google and Apple are rolling out an anti-stalking feature for Android 6.0+ and iOS 17.5 that will issue an alert if some scumbag is using a gadget like an AirTag or similar to clandestinely track the user.

Published: 2024-05-14T13:30:15



The Register - Security

Visualize your critical cyber risks

How to empower CISOs and mitigate cyber security risks in a rapidly evolving threat landscape Sponsored Post Defending against the cyber threats of today isn't dissimilar to protecting a medieval castle from attack a thousand years ago.

Published: 2024-05-14T09:39:06



The Register - Security

NHS Digital hints at exploit sightings of Arcserve UDP vulnerabilities

When PoC code is released within a day of disclosure, it's only a matter of time before attacks kick off The UK's NHS is warning of the possibility that vulnerabilities in Arcserve Unified Data Protection (UDP) software are being actively exploited.

Published: 2024-05-14T09:29:11



The Register - Security

'Cyberattack' shutters Christie's website days before $840M art mega-auction

Going once, going twice, going offline Christie's website remains offline as of Monday after a "technology security issue" shut it down Thursday night just days before the venerable auction house planned to flog $840 million of art.

Published: 2024-05-13T19:36:08



Security Latest

Teslas Can Still Be Stolen With a Cheap Radio Hack Despite New Keyless Tech

Ultra-wideband radio has been heralded as the solution for “relay attacks” that are used to steal cars in seconds. But researchers found Teslas equipped with it are as vulnerable as ever.

Published: 2024-05-22T14:00:00



Security Latest

Eventbrite Promoted Illegal Opioid Sales to People Searching for Addiction Recovery Help

A WIRED investigation found thousands of Eventbrite posts selling escort services and drugs like Xanax and oxycodone some of which the company’s algorithm recommended alongside addiction recovery events.

Published: 2024-05-21T10:30:00



Security Latest

WikiLeaks’ Julian Assange Can Appeal His Extradition to the US, British Court Says

Two judges in London have ruled that WikiLeaks’ founder Julian Assange can appeal his extradition to the US on freedom of speech grounds.

Published: 2024-05-20T12:57:45



Security Latest

How to Remove Your Personal Info From Google’s Search Results

Maybe you don’t want your phone number, email, home address, and other details out there for all the web to see. Here’s how to make them vanish.

Published: 2024-05-20T11:00:00



Security Latest

US Official Warns a Cell Network Flaw Is Being Exploited for Spying

Plus: Three arrested in North Korean IT workers fraud ring, Tesla staffers shared videos from owners’ cars, and more.

Published: 2024-05-18T10:00:00



Security Latest

Android Update: Theft Detection Lock Knows When Your Phone Is Stolen

Google is introducing new AI-powered safety tools in Android 15 that can lock down your phone if thieves nab it.

Published: 2024-05-15T17:00:00



Security Latest

Secrecy Concerns Mount Over Spy Powers Targeting US Data Centers

A coalition of digital rights groups is demanding the US declassify records that would clarify just how expansive a major surveillance program really is.

Published: 2024-05-14T16:16:58



Security Latest

Internal Emails Reveal How a Controversial Gun-Detection AI System Found Its Way to NYC

NYC mayor Eric Adams wants to test Evolv’s gun-detection tech in subway stations despite the company saying it’s not designed for that environment. Emails obtained by WIRED show how the company still found an in.

Published: 2024-05-13T16:59:51



Security Latest

The $2.3 Billion Tornado Cash Case Is a Pivotal Moment for Crypto Privacy

Tuesday’s verdict in the trial of Alexey Pertsev, a creator of crypto-privacy service Tornado Cash, is the first in a string of cases that could make it much harder to skirt financial surveillance.

Published: 2024-05-13T14:12:03



Security Latest

Welcome to the Laser Wars

Amid a rising tide of adversary drones and missile attacks, laser weapons are finally poised to enter the battlefield.

Published: 2024-05-13T09:00:00



Security Latest

Microsoft Deploys Generative AI for US Spies

Plus: China is suspected in a hack targeting the UK’s military, the US Marines are testing gun-toting robotic dogs, and Dell suffers a data breach impacting 49 million customers.

Published: 2024-05-11T10:30:00



Security Latest

‘TunnelVision’ Attack Leaves Nearly All VPNs Vulnerable to Spying

TunnelVision is an attack developed by researchers that can expose VPN traffic to snooping or tampering.

Published: 2024-05-10T16:56:20



Security Latest

Top FBI Official Urges Agents to Use Warrantless Wiretaps on US Soil

An internal email from FBI deputy director Paul Abbate, obtained by WIRED, tells employees to search for “US persons” in a controversial spy program's database that investigators have repeatedly misused.

Published: 2024-05-08T17:48:45



Security Latest

A (Strange) Interview With the Russian-Military-Linked Hackers Targeting US Water Utilities

Despite Cyber Army of Russia’s claims of swaying US “minds and hearts,” experts say the cyber sabotage group appears to be hyping its hacking for a domestic audience.

Published: 2024-05-08T10:00:00



Security Latest

The Alleged LockBit Ransomware Mastermind Has Been Identified

Law enforcement officials say they’ve identified, sanctioned, and indicted the person behind LockBitSupp, the administrator at the heart of LockBit’s $500 million hacking rampage.

Published: 2024-05-07T14:19:35



Security Latest

Apple’s iPhone Spyware Problem Is Getting Worse. Here’s What You Should Know

The iPhone maker has detected spyware attacks against people in more than 150 countries. Knowing if your device is infected can be tricky but there are a few steps you can take to protect yourself.

Published: 2024-05-06T11:30:00



Security Latest

A New Surveillance Tool Invades Border Towns

Plus: An assassination plot, an AI security bill, a Project Nimbus revelation, and more of the week’s top security news.

Published: 2024-05-04T10:30:00



Security Latest

These Dangerous Scammers Don’t Even Bother to Hide Their Crimes

“Yahoo Boy” cybercriminals are openly running dozens of scams across Facebook, WhatsApp, Telegram, TikTok, YouTube, and more.

Published: 2024-05-03T09:00:00



Security Latest

The Breach of a Face Recognition Firm Reveals a Hidden Danger of Biometrics

Outabox, an Australian firm that scanned faces for bars and clubs, suffered a breach that shows the problems with giving companies your biometric data.

Published: 2024-05-02T15:24:21



Security Latest

Inside Ukraine’s Killer-Drone Startup Industry

Ukraine needs small drones to combat Russian forces and is bootstrapping its own industry at home.

Published: 2024-05-02T06:00:00



News Packet Storm

How Apple Wi-Fi Positioning System Can Be Abused To Track People Around The Globe

VMware Abused In Recent MITRE Hack For Persistence, Evasion

70% Of CISOs Worry Their Org Is At Risk Of A Material Cyber Attack

Veeam Patches Critical Flaw That Puts Enterprise Backups At Risk

55,000 Impacted By Cyberattack On California School Association

Researchers Spot Cryptojacking Attack That Disables Endpoint Protections

Microsoft's AI Recall Feature Raises Security, Privacy Concerns

Uncle Sam To Inject $50M Into Auto-Patcher For Hospital IT

LockBit Dethroned As Ransomware Leader Since Takedown

Congo Lawyers Say They Have New Evidence On Apple's Minerals Supply Chain

GitHub Enterprise Server Patches 10-outta-10 Critical Hole

Rockwell Automation Urges Customers To Disconnect ICS From Internet

We May Know A Whole Lot More About UFOs Soon

OpenSSF Sings A Siren Song To Steer Developers Away From Buggy FOSS

Julian Assange Can Appeal Extradition To The US, London Court Rules

You Can Now Buy A 4-Foot-Tall Humanoid Robot For $16k

Zoom Adding Post-Quantum End-to-End Encryption To All Products

CISA Warns Of Attacks Exploiting NextGen Healthcare Mirth Connect Flaw

6k-plus AI Models May Be Affected By Critical RCE Vulnerability

User Outcry As Slack Scrapes Customer Data For AI Model Training

How I Upgraded My Water Heater And Discovered How Bad Smart Home Security Can Be

2.4 Million Affected By WebTPA Data Breach

Researchers Call Out QNAP For Dragging Its Heels On Patch Development

Critical Flaw In AI Python Package Can Lead To System And Data Compromise

Microsoft Quick Assist Tool Abused For Ransomware Delivery

SecurityWeek

VMware Abused in Recent MITRE Hack for Persistence, Evasion

Bolster Raises $14 Million for AI-Powered Phishing Protection

55,000 Impacted by Cyberattack on California School Association

Cybersecurity Labeling for Smart Devices Aims to Help People Choose Items Less Likely to be Hacked

Zero-Day Attacks and Supply Chain Compromises Surge, MFA Remains Underutilized: Rapid7 Report

Why We Need to Get a Handle on AI

Newly Detected Chinese Group Targeting Military, Government Entities

400,000 Impacted by CentroMed Data Breach

NYSE Operator Intercontinental Exchange Gets $10M SEC Fine Over 2021 Hack

Using AI, Mastercard Expects to Find Compromised Cards Quicker, Before They Get Used by Criminals

CISA News

CISA and ONCD Award the Winners of the Fifth Annual President’s Cup Cybersecurity Competition

CISA Publishes Encrypted DNS Implementation Guidance to Federal Agencies

CISA, DHS, FBI and International Partners Publish Guide for Protecting High-Risk Communities

CISA Announces Secure by Design Commitments from Leading Technology Providers

CISA Unveils New Public Service Announcement We Can Secure Our World

DHS, CISA Announce Membership Changes to the Cyber Safety Review Board

CISA Releases Physical Security Checklist to Help Election Officials Secure Polling Locations

CISA Announces Winners of the 5th Annual President’s Cup Cybersecurity Competition

CISA, FBI, and ODNI Release Guidance for Securing Election Infrastructure Against the Tactics of Foreign Malign Influence Operations

CISA Directs Federal Agencies to Immediately Mitigate Significant Risk From Russian State-Sponsored Cyber Threat

CISA Blog

Prepared Together Cyber Storm IX Recap

Securing Tomorrow: A Recap of CISA’s Cyber Resilient 911 Symposium (Central Region)

Opening Statement by CISA Director Jen Easterly at the Update on Foreign Threats to the 2024 Elections Hearing

CISA Updates Toolkit with Nine New Resources to Promote Public Safety Communications and Cyber Resiliency

Categorically Unsafe Software

The Top Four Things Tech Manufacturers can do to Bolster the Cybersecurity of Target-Rich, Cyber-Poor Organizations

SAFECOM Publishes 2024 SAFECOM Strategic Plan

Honoring our Unsung Heroes Celebrating Public Service Recognition Week

SAFECOM Publishes 2023 SAFECOM Annual Summary

Under the Digital Radar: Defending Against People’s Republic of China’s Nation-State Cyber Threats to America’s Small Businesses

All CISA Advisories

CISA Releases One Industrial Control Systems Advisory

AutomationDirect Productivity PLCs

CISA Releases One Industrial Control Systems Advisory

Rockwell Automation Encourages Customers to Assess and Secure Public-Internet-Exposed Assets

LCDS LAquis SCADA

CISA Adds Two Known Exploited Vulnerabilities to Catalog

Siemens Solid Edge

Siemens Desigo Fire Safety UL and Cerberus PRO UL Fire Protection Systems

CISA Releases Seventeen Industrial Control Systems Advisories

Siemens Parasolid

Full Disclosure

asterisk release 20.8.1

asterisk release 21.3.1

asterisk release 18.23.1

CVE-2024-34058: Nethserver 7 & 8 stored cross-site scripting (XSS) in WebTop package

SEC Consult SA-20240513-0 :: Tolerating Self-Signed Certificates in SAP Cloud Connector

TROJANSPY.WIN64.EMOTET.A / Arbitrary Code Execution

BACKDOOR.WIN32.ASYNCRAT / Arbitrary Code Execution

Re: Panel.SmokeLoader / Cross Site Request Forgery (CSRF)

Panel.SmokeLoader / Cross Site Request Forgery (CSRF)

Panel.SmokeLoader C2 / Cross Site Scripting (XSS)

Panel.Amadey.d.c C2 / Cross Site Scripting (XSS)

Re: RansomLord v3 / Anti-Ransomware Exploit Tool Released

RansomLord v3 / Anti-Ransomware Exploit Tool Released

APPLE-SA-05-13-2024-8 tvOS 17.5

APPLE-SA-05-13-2024-7 watchOS 10.5

Open Source Security

asterisk security releases 18.23.1, 20.8.1, & 21.3.1

WebKitGTK and WPE WebKit Security Advisory WSA-2024-0003

Re: Article: State of Sandboxing in Linux

Article: State of Sandboxing in Linux

Re: Linux: Disabling network namespaces

CVE-2024-34058: Nethserver 7 & 8 stored cross-site scripting (XSS) in WebTop package

OpenSSL Security Advisory [corrected CVE id]

OpenSSL Security Advisory

CVE-2024-21823: Intel DSA and Intel IAA advisory

git: 5 vulnerabilities fixed

CVE-2024-32077: Apache Airflow: XSS vulnerability in Task Instance Log/Log Details

Re: Microsoft Device Firmware Configuration Interface (DFCI) in Linux efivars directory

Re: Microsoft Device Firmware Configuration Interface (DFCI) in Linux efivars directory

PowerDNS Security Advisory 2024-03: Transfer requests received over DoH can lead to a denial of service in DNSdist

Re: lsof "can't stat() fuse.${name} filesystem /run/user/1000/${dir}"

Exploit-DB.com RSS Feed

[webapps] htmlLawed 1.2.5 - Remote Code Execution (RCE)

[webapps] PopojiCMS 2.0.1 - Remote Command Execution (RCE)

[webapps] Backdrop CMS 1.27.1 - Remote Command Execution (RCE)

[webapps] Apache OFBiz 18.12.12 - Directory Traversal

[webapps] Wordpress Theme XStore 9.3.8 - SQLi

[webapps] Rocket LMS 1.9 - Persistent Cross Site Scripting (XSS)

[webapps] Prison Management System - SQL Injection Authentication Bypass

[webapps] PyroCMS v3.0.1 - Stored XSS

[webapps] CE Phoenix Version 1.0.8.20 - Stored XSS

[webapps] Leafpub 1.1.9 - Stored Cross-Site Scripting (XSS)

[webapps] Chyrp 2.5.2 - Stored Cross-Site Scripting (XSS)

[remote] CrushFTP < 11.1.0 - Directory Traversal

[local] Plantronics Hub 3.25.1 - Arbitrary File Read

[webapps] Apache mod_proxy_cluster - Stored XSS

[webapps] iboss Secure Web Gateway - Stored Cross-Site Scripting (XSS)

[webapps] Clinic Queuing System 1.0 - RCE

[webapps] Elber Reble610 M/ODU XPIC IP-ASI-SDH Microwave Link - Device Config Disclosure

[webapps] Elber Reble610 M/ODU XPIC IP-ASI-SDH Microwave Link - Authentication Bypass

[webapps] Elber Cleber/3 Broadcast Multi-Purpose Platform 1.0.0 - Device Config Disclosure

[webapps] Elber Cleber/3 Broadcast Multi-Purpose Platform 1.0.0 - Authentication Bypass

[webapps] Elber Signum DVB-S/S2 IRD For Radio Networks 1.999 - Device Config Disclosure

[webapps] Elber Signum DVB-S/S2 IRD For Radio Networks 1.999 - Authentication Bypass

[webapps] Flowise 1.6.5 - Authentication Bypass

[webapps] Laravel Framework 11 - Credential Leakage

[webapps] SofaWiki 3.9.2 - Remote Command Execution (RCE) (Authenticated)

[webapps] Wordpress Plugin Background Image Cropper v1.2 - Remote Code Execution

[webapps] FlatPress v1.3 - Remote Command Execution

[remote] Palo Alto PAN-OS < v11.1.2-h3 - Command Injection and Arbitrary File Creation

[webapps] OpenClinic GA 5.247.01 - Path Traversal (Authenticated)

[webapps] OpenClinic GA 5.247.01 - Information Disclosure

[webapps] Jenkins 2.441 - Local File Inclusion

[webapps] djangorestframework-simplejwt 5.3.1 - Information Disclosure

[webapps] BMC Compuware iStrobe Web - 20.13 - Pre-auth RCE

[webapps] Stock Management System v1.0 - Unauthenticated SQL Injection

[webapps] Online Fire Reporting System OFRS - SQL Injection Authentication Bypass

[webapps] Savsoft Quiz v6.0 Enterprise - Stored XSS

[webapps] Wordpress Plugin WP Video Playlist 1.1.1 - Stored Cross-Site Scripting (XSS)

[webapps] WBCE CMS Version 1.6.1 - Remote Command Execution (Authenticated)

[webapps] WBCE 1.6.0 - Unauthenticated SQL injection

[webapps] Moodle 3.10.1 - Authenticated Blind Time-Based SQL Injection - "sort" parameter

[local] PrusaSlicer 2.6.1 - Arbitrary code execution

[webapps] PopojiCMS Version 2.0.1 - Remote Command Execution

[webapps] Wordpress Plugin Playlist for Youtube 1.32 - Stored Cross-Site Scripting (XSS)

[webapps] HTMLy Version v2.9.6 - Stored XSS

[webapps] Ray OS v2.6.3 - Command Injection RCE(Unauthorized)

[local] Terratec dmx_6fire USB - Unquoted Service Path

[remote] MinIO < 2024-01-31T20-20-33Z - Privilege Escalation

[webapps] GUnet OpenEclass E-learning platform 3.15 - 'certbadge.php' Unrestricted File Upload

[webapps] Open Source Medicine Ordering System v1.0 - SQLi

[webapps] Daily Expense Manager 1.0 - 'term' SQLi






© Segmentation Fault . All rights reserved.

Privacy | Terms of Use | Contact Us