"Pig Butchering Trading Apps Found on Google Play, App Store"

"Pig Butchering Trading Apps Found on Google Play, App Store"

Security researchers at Group-IB have discovered fake trading apps on Google Play and Apple's App Store that lure victims into "pig butchering" scams.  After being reported, the apps have been removed from the official Android and iOS stores after accumulating several thousand downloads.  Pig butchering is a scam where a victim is led to believe they are getting high investment returns on a fake trading platform that displays fabricated information.

Submitted by Adam Ekwall on

"Litespeed Cache Plugin Flaw Allows XSS Attack, Update Now"

"Litespeed Cache Plugin Flaw Allows XSS Attack, Update Now"

Security researchers at Patchstack discovered a new vulnerability in the LiteSpeed Cache plugin for WordPress that could allow unauthenticated attackers to inject malicious code into websites. The flaw impacts the plugin’s CSS queue generation process and affects over six million active installations. The vulnerability, tracked as CVE-2024-47374, is an unauthenticated stored XSS issue that could lead to privilege escalation or data theft. The researchers noted that it exploits the plugin’s “Vary Group” functionality, which controls cache variations based on user roles.

Submitted by Adam Ekwall on

"Court Data Exposed by Vulnerabilities in Software Used by US Government: Researcher"

Cybersecurity researcher Jason Parker found that several e-filing and record management systems used by government organizations in the US were impacted by serious vulnerabilities, which exposed court records and other types of information. They were found in products used in Georgia, Florida, Ohio, Arizona, South Carolina, and other states. This article continues to discuss the vulnerabilities discovered in several e-filing and record management systems.

"Share of Women in UK Cyber Roles Now Just 17%"

"Share of Women in UK Cyber Roles Now Just 17%"

According to security researchers at Socura, cybersecurity is now the fastest-growing IT role in the UK, but the share of women in such positions has fallen dramatically since 2021.  The researchers claimed the number of security professionals has more than doubled since Jan-Dec 2021, from 28,500 to 65,000 in March 2024.  An increase of 128% makes it the fastest-growing of any IT-related profession over that period, followed by IT support (42%), IT trainers (33%), and IT business analysts, architects, and systems designers (33%).

Submitted by Adam Ekwall on

"CeranaKeeper Emerges as New Threat to Thai Government Networks"

"CeranaKeeper Emerges as New Threat to Thai Government Networks"

Security researchers at ESET have recently identified a new China-aligned threat group named CeranaKeeper, which is targeting governmental institutions in Thailand.  This group has been active since early 2022 and leverages an evolving toolset to exfiltrate sensitive data by abusing legitimate cloud services such as Dropbox, OneDrive, and GitHub.  While some of CeranaKeeper's tools were previously attributed to the Mustang Panda group, the researchers' new analysis revealed technical differences, suggesting these are distinct entities.

Submitted by Adam Ekwall on

"Crypto-Doubling Scams Surge Following Presidential Debate"

"Crypto-Doubling Scams Surge Following Presidential Debate"

Security researchers at Netcraft have warned of a new wave of investment scams attempting to cash in on public awareness of the presidential debate last month. The researchers found 24 such domains related to the debate, including 14 phishing sites using the word “debate” in their domain. Many of the websites exploit the image of Republican presidential nominee Donald Trump, tech entrepreneur and billionaire Elon Musk, or a blend of both. The researchers noted that criminals likely use these personas to add legitimacy to their crypto investment theme.

Submitted by Adam Ekwall on

CfP: 31st IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS 2025)

CfP: 31st IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS 2025)

RTAS is a top-tier conference with a focus on systems with timing requirements. RTAS’25 welcomes papers describing applications, case studies, methodologies, tools, algorithms or operating systems, middleware or hardware innovations that contribute to the state of the art in the design, implementation, validation, verification, and evolution of systems with timing requirements.
Submitted by Amy Karns on

31st IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS 2025)

Submitted by Amy Karns on

RTAS is a top-tier conference with a focus on systems with timing requirements. RTAS’25 welcomes papers describing applications, case studies, methodologies, tools, algorithms or operating systems, middleware or hardware innovations that contribute to the state of the art in the design, implementation, validation, verification, and evolution of systems with timing requirements.

"Millions of Vehicles Could Be Hacked and Tracked Thanks to a Simple Website Bug"

"Millions of Vehicles Could Be Hacked and Tracked Thanks to a Simple Website Bug"

Independent security researchers found a flaw in a web portal operated by the carmaker Kia that allowed them to track millions of cars, unlock doors, and start engines. The flaw discovered in the web portal enabled them to reassign control of most modern Kia vehicles' Internet-connected features, from the car owner's smartphone to their own phone or computer.

Submitted by Gregory Rigby on

"Python-Based Malware Slithers Into Systems via Legit VS Code"

"Python-Based Malware Slithers Into Systems via Legit VS Code"

"Mustang Panda," a Chinese Advanced Persistent Threat (APT) group, is suspected of being behind an ongoing sophisticated cyber espionage campaign. It involves malicious emails, and the use of Visual Studio Code (VS Code) to spread Python-based malware, which gives attackers persistent remote access to infected machines. The Cyble Research and Intelligence Lab (CRIL) discovered the campaign spreading a .lnk file posing as a legitimate setup file to download a Python distribution package. It is actually used to run a malicious Python script.

Submitted by Gregory Rigby on
Subscribe to