News
-
"Chromium Browsers Allow Data Exfiltration via Bookmark Syncing"Bookmark synchronization has become a standard feature in modern browsers as it allows Internet users to ensure that the changes they make to bookmarks on one device are reflected on all of their devices at the same time. However, the same useful browser…
-
"Nearly 3,200 Apps Discovered Leaking Twitter API Keys, Some Even Allow Account Hijacks"Researchers discovered 3,207 mobile apps that expose Twitter API keys to the public, potentially allowing a threat actor to hijack users' connected Twitter accounts. The discovery was made by CloudSEK, a cybersecurity firm that examined various apps for…
-
"Public Transit Agencies Are Vulnerable to Cyber Threats, Researchers Warn"Researchers with the Mineta Transportation Institute (MTI) urge transit agencies to implement a unified risk management strategy as well as regulators to provide more guidance. According to a recent MTI report, transit agencies are unprepared for hacks…
-
"Windows Defender Is Being Abused to Side-Load LockBit 3.0"Researchers discovered that Log4j vulnerabilities are now being used to deploy Cobalt Strike beacons via the Windows Defender command line tool. Sentinel Labs cybersecurity researchers recently discovered the new method used by an unknown threat actor,…
-
"UF to Lead $7.5M NSF-Funded Project on Protecting Security of Marginalized and Vulnerable Populations"Using a $7.5 million National Science Foundation (NSF) grant, University of Florida (UF) engineers are leading a new effort to understand how current technologies such as smartphones and video conferencing marginalize groups such as the poor, children…
-
"Attackers Have 'Favorite' Vulnerabilities to Exploit"According to researchers from Palo Alto Networks, attackers play favorites when looking at which software vulnerabilities to target. The researchers stated that nearly one in three, or 31%, of incidents analyzed by Unit 42 in its 2022 "Incident…
-
"Credential Stealer Malware Raccoon Updated to Obtain Passwords More Efficiently"Security experts at Zscaler have analyzed the new variant of the known Raccoon Stealer malware. The researchers stated that the latest version of the malware is written in C, unlike previous versions, which were mainly written in C++. Raccoon…
-
"Blockchain Security Firm Warns of New MetaMask Phishing Campaign"Halborn, a blockchain security firm, has issued an alert regarding a new phishing campaign targeting MetaMask cryptocurrency wallet users. The active phishing campaign, according to a post by Halborn's technical education specialist Luis Lubeck, used…
-
"White House Official: EPA to Issue Cybersecurity Rule for Water Facilities"According to a key White House official, the Environmental Protection Agency (EPA) will soon include cybersecurity in sanitation reviews of the nation's critical water facilities under a new rule. Because of EPA's "limited" authorities, White House…
-
"Giant Investment Scam Network Targets Victims with Phone Calls"Security researchers at Group-IB have uncovered a massive investment fraud campaign targeting European victims via online and phone channels. The researchers stated that the "gigantic network infrastructure" covers over 10,000 rogue websites…
-
"Facebook Ads Promoted Apps with HiddenAds Malware, Affects 1M+ Users"McAfee's Mobile Research Team discovered HiddenAds malware in apps distributed via the Google Play Store. One app masquerades as a system cleaner to delete junk files on devices. Another HiddenAds-laced app claims to help optimize battery life for device…
-
"CISA Warns of Critical Confluence Bug Exploited in Attacks"US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA) has added a critical Confluence vulnerability, tracked as CVE-2022-26138, to its list of exploited bugs. This flaw can provide remote attackers with hardcoded…