"Clever 'GitHub Scanner' Campaign Abusing Repos to Push Malware"

"Clever 'GitHub Scanner' Campaign Abusing Repos to Push Malware"

A new phishing campaign is using GitHub repositories to spread the "Lumma Stealer" password-stealing malware to those who frequent or receive email notifications from an open source project repository. It involves a malicious GitHub user opening a new "issue" on an open source repository, claiming that the project has a "security vulnerability," and encouraging others to visit a counterfeit "GitHub Scanner" domain. The domain is actually not associated with GitHub and lures users into installing Windows malware.

Submitted by Gregory Rigby on

"Preventing Ransomware by Fully Remediating Infostealer Attacks"

"Preventing Ransomware by Fully Remediating Infostealer Attacks"

According to SpyCloud's "2024 Malware and Ransomware Defense Report," ransomware attacks often use data stolen through previous infostealer infections, emphasizing the need to remediate all malware infections thoroughly. Based on a survey of over 500 security professionals, almost a third of ransomware attacks were preceded by an infostealer attack in the past three months. In addition to credentials, infostealer malware can steal session cookies to sidestep Multi-Factor Authentication (MFA) and hijack accounts.

Submitted by Gregory Rigby on

"Preparing Neurodivergent Learners for Cybersecurity Careers"

"Preparing Neurodivergent Learners for Cybersecurity Careers"

Researchers at the University of Missouri are developing a Virtual Reality (VR) platform named "USucceed" to help teach cybersecurity to people with autism, dyslexia, attention deficit disorders, and other neurodevelopmental differences. Noah Glaser, an assistant professor and director of the Information Experience Laboratory in Mizzou's College of Education and Human Development, explained that the platform serves two critical functions, the first of which aims to meet the growing demand for a skilled cybersecurity workforce.

Submitted by Gregory Rigby on

"Identifying What's 'Not Normal' Could Help Protect Electric Power Systems"

"Identifying What's 'Not Normal' Could Help Protect Electric Power Systems"

Cybersecurity researchers at the Georgia Institute of Technology (Georgia Tech) seek to identify "abnormal" and "illogical" control system commands suggesting the presence of insider threats or malicious attackers. They are doing so by gaining further insight into what are considered "normal" operations within electric power systems. Understanding normal operations and detecting suspicious activities will rely on using Artificial Intelligence (AI) to understand what the complex grid systems usually do and to identify actions that logically should not happen.

Submitted by Gregory Rigby on

"College of Education Researchers to Integrate Cybersecurity with Math, Science Lessons through $2 Million Grant-funded Project"

"College of Education Researchers to Integrate Cybersecurity with Math, Science Lessons through $2 Million Grant-funded Project"

Researchers at North Carolina State University are conducting a project to raise awareness among young students about the safety risks that come with being online, as well as prepare elementary school teachers to teach cybersecurity topics. The project, funded by a National Science Foundation (NSF) DRK-12 grant and conducted in collaboration with the University of Delaware, will develop and test a professional development program that will support teachers in integrating cybersecurity lessons into fourth and fifth-grade math and science instruction.

Submitted by Gregory Rigby on

"For Just $20, Researchers Seize Part of Internet Infrastructure"

"For Just $20, Researchers Seize Part of Internet Infrastructure"

Researchers at watchTowr showed the ability to seize part of the Internet's infrastructure for just $20, bringing attention to the fragility of the trust and cybersecurity mechanisms that organizations and users depend on. While looking for Remote Code Execution (RCE) vulnerabilities in WHOIS clients, the researchers found that the WHOIS server for the .mobi Top Level Domain (TLD) (for mobile-optimized sites) had migrated years ago from "whois.dotmobiregistry.net" to "whois.nic.mobi".

Submitted by Gregory Rigby on

"Apple Patches Vision Pro Vulnerability to Prevent GAZEploit Attacks"

"Apple Patches Vision Pro Vulnerability to Prevent GAZEploit Attacks"

Apple has patched its Vision Pro Mixed Reality (MR) headset after researchers showed that an attacker could track a user's eyes to infer what they are typing. Vision Pro users can type by using a virtual keyboard and looking at each of the keys they want to press. "GAZEploit," an attack method shown by a team of researchers from the University of Florida and Texas Tech University, can be used to guess what a Vision Pro user is typing by tracking their avatar's eye movement. This article continues to discuss Apple's patching of Vision Pro following researchers' GAZEploit demonstration.

Submitted by Gregory Rigby on

"TrickMo Android Trojan Exploits Accessibility Services for On-Device Banking Fraud"

"TrickMo Android Trojan Exploits Accessibility Services for On-Device Banking Fraud"

Researchers at Cleafy found a new variant of the Android banking trojan called "TrickMo" that can evade analysis and display fake login screens to steal victims' banking credentials. According to Cleafy, the new capabilities involve using malformed ZIP files together with JSONPacker. The application is installed via a dropper app with the same anti-analysis mechanisms. This article continues to discuss findings regarding the new variant of TrickMo.

Submitted by Gregory Rigby on

"Socially Savvy Scattered Spider Traps Cloud Admins in Web"

"Socially Savvy Scattered Spider Traps Cloud Admins in Web"

One of the most dangerous ransomware groups, "Scattered Spider," has been using its clever social engineering approach to launch targeted, sophisticated phishing attacks against financial and insurance companies to steal high-level cloud permissions and deliver ransomware. Scattered Spider has been conducting smishing and vishing attacks to target the accounts of Information Technology (IT) service desk administrators and other high-privileged accounts.

Submitted by Gregory Rigby on
Subscribe to