Stay Updated with the Latest Tech News


Get ahead of the curve with the latest insights, trends, and analysis in the tech world.


Browse by Category

Popular Topics
#General #Development #Mobile Development #Cloud & DevOps #Cybersecurity & Privacy #AI & Data Science #Hardware & Gadgets #Design & UX

Critical OpenWrt Vulnerability Exposes Devices to Malicious Firmware Injection

A security flaw has been disclosed in OpenWrt's Attended Sysupgrade (ASU) feature that, if successfully exploited, could have been abused to distribute malicious firmware packages. The vulnerability, tracked as CVE-2024-54143, carries a CVSS score of 9.3 out of a maximum of 10, indicating critical severity. Flatt Security researcher RyotaK has been credited with discovering and reporting the

The Hacker News favicon The Hacker News β€’ 11 months ago β€’ 1 min read

Ultralytics Supply-Chain Attack

Last week, we saw a supply-chain attack against the Ultralytics AI library on GitHub. A quick summary: On December 4, a malicious version 8.3.41 of the popular AI library ultralytics β€”which has almost 60 million downloadsβ€”was published to the Python Package Index (PyPI) package repository. The package contained downloader code that was downloading the XMRig coinminer. The compromise of the project’s build environment...

Schneier on Security favicon Schneier on Security β€’ 11 months ago β€’ 1 min read

Black Hat Europe 2024: Hacking a car – or rather, its infotainment system

Our β€˜computers on wheels’ are more connected than ever, but the features that enhance our convenience often come with privacy risks in tow

WeLiveSecurity favicon WeLiveSecurity β€’ 11 months ago β€’ 1 min read

DoJ Indicts 14 North Koreans for $88M IT Worker Fraud Scheme Over Six Years

The U.S. Department of Justice (DoJ) has indicted 14 nationals belonging to the Democratic People's Republic of Korea (DPRK or North Korea) for their alleged involvement in a long-running conspiracy to violate sanctions and commit wire fraud, money laundering, and identity theft by illegally seeking employment in U.S. companies and non-profit organizations. "The conspirators, who worked for

The Hacker News favicon The Hacker News β€’ 11 months ago β€’ 1 min read

OData Injection Risk in Low-Code/No-Code Environments

As the adoption of LCNC grows, so will the complexity of the threats organizations face.

Dark Reading favicon Dark Reading β€’ 11 months ago β€’ 1 min read

Iran-Linked IOCONTROL Malware Targets SCADA and Linux-Based IoT Platforms

Iran-affiliated threat actors have been linked to a new custom malware that's geared toward IoT and operational technology (OT) environments in Israel and the United States. The malware has been codenamed IOCONTROL by OT cybersecurity company Claroty, highlighting its ability to attack IoT and supervisory control and data acquisition (SCADA) devices such as IP cameras, routers, programmable

The Hacker News favicon The Hacker News β€’ 11 months ago β€’ 1 min read

How to Generate a CrowdStrike RFM Report With AI in Tines

Run by the team at orchestration, AI, and automation platform Tines, the Tines library contains pre-built workflows shared by real security practitioners from across the community, all of which are free to import and deploy via the Community Edition of the platform. Their bi-annual β€œYou Did What with Tines?!” competition highlights some of the most interesting workflows submitted by their

The Hacker News favicon The Hacker News β€’ 11 months ago β€’ 1 min read

Black Hat Europe 2024: Why a CVSS score of 7.5 may be a 'perfect' 10 in your organization

Aggregate vulnerability scores don’t tell the whole story – the relationship between a flaw’s public severity rating and the specific risks it poses for your company is more complex than it seems

WeLiveSecurity favicon WeLiveSecurity β€’ 11 months ago β€’ 1 min read

New Linux Rootkit PUMAKIT Uses Advanced Stealth Techniques to Evade Detection

Cybersecurity researchers have uncovered a new Linux rootkit called PUMAKIT that comes with capabilities to escalate privileges, hide files and directories, and conceal itself from system tools, while simultaneously evading detection. "PUMAKIT is a sophisticated loadable kernel module (LKM) rootkit that employs advanced stealth mechanisms to hide its presence and maintain communication with

The Hacker News favicon The Hacker News β€’ 11 months ago β€’ 1 min read

'Dubai Police' Lures Anchor Wave of UAE Mobile Attacks

A sophisticated social engineering cybercrime campaign bent on financial gain was observed being run from Tencent servers in Singapore.

Dark Reading favicon Dark Reading β€’ 11 months ago β€’ 1 min read

FBI Busts Rydox Marketplace with 7,600 PII Sales, Cryptocurrency Worth $225K Seized

The U.S. Department of Justice (DoJ) on Thursday announced the shutdown of an illicit marketplace called Rydox ("rydox[.]ru" and "rydox[.]cc") for selling stolen personal information, access devices, and other tools for conducting cybercrime and fraud. In tandem, three Kosovo nationals and administrators of the service, Ardit Kutleshi, Jetmir Kutleshi, and Shpend Sokoli, have been arrested.

The Hacker News favicon The Hacker News β€’ 11 months ago β€’ 1 min read

Lloyd's of London Launches New Cyber Insurance Consortium

Under the program, HITRUST-certified organizations gain access to exclusive coverage and rates.

Dark Reading favicon Dark Reading β€’ 11 months ago β€’ 1 min read

336K Prometheus Instances Exposed to DoS, 'Repojacking'

Open source Prometheus servers and exporters are leaking plaintext passwords and tokens, along with API addresses of internal locations.

Dark Reading favicon Dark Reading β€’ 11 months ago β€’ 1 min read

Chinese Cops Caught Using Android Spyware to Track Mobile Devices

Law enforcement across mainland China have been using EagleMsgSpy surveillance tool to collect mobile device data since at least 2017, new research shows.

Dark Reading favicon Dark Reading β€’ 11 months ago β€’ 1 min read

Cybercriminal marketplace Rydox seized in international law enforcement operation

The Justice Department announced Thursday that it had participated in a coordinated effort to seize and dismantle Rydox, an online marketplace for stolen personal information and cybercrime tools. The operation led to the arrest of three individuals alleged to be the site’s administrators. Rydox has been linked to over 7,600 illicit sales and generated substantial […] The post Cybercriminal marketplace Rydox seized in...

CyberScoop favicon CyberScoop β€’ 11 months ago β€’ 1 min read

IoT Cloud Cracked by 'Open Sesame' Over-the-Air Attack

Researchers at Black Hat Europe demonstrate how to hack Ruijie Reyee access points without Wi-Fi credentials or even physical access to the device.

Dark Reading favicon Dark Reading β€’ 11 months ago β€’ 1 min read

Court indicts 14 North Korean IT workers tied to $88 million in illicit gains

It’s part of a broader effort to counter Pyongyang’s use of tech professionals to fool U.S. companies and nonprofits. The post Court indicts 14 North Korean IT workers tied to $88 million in illicit gains appeared first on CyberScoop.

CyberScoop favicon CyberScoop β€’ 11 months ago β€’ 1 min read

Europol Cracks Down on Holiday DDoS Attacks

In Operation PowerOFF, global authorities aim to deter individuals from engaging in malicious cyber acts.

Dark Reading favicon Dark Reading β€’ 11 months ago β€’ 1 min read

Efforts to Secure US Telcos Beset by Salt Typhoon Might Fall Flat

The rules necessary to secure US communications have already been in place for 30 years, argues Sen. Wyden, the FCC just hasn't enforced them. It's unclear if they will help.

Dark Reading favicon Dark Reading β€’ 11 months ago β€’ 1 min read

Notorious Nigerian cybercriminal tied to BEC scams extradited to U.S.

Abiola Kayode, a 37-year-old Nigerian national, has been extradited from Ghana to the United States to face charges of conspiracy to commit wire fraud. Kayode, who was on the FBI’s Most Wanted cybercriminal list, is charged with participating in a business email compromise (BEC) scheme and romance fraud from January 2015 to September 2016, defrauding […] The post Notorious Nigerian cybercriminal tied to BEC scams...

CyberScoop favicon CyberScoop β€’ 11 months ago β€’ 1 min read

International crackdown disrupts DDoS-for-hire operations

An operation known as PowerOFF led to the arrest of three individuals and the shutdown of 27 domains. The post International crackdown disrupts DDoS-for-hire operations appeared first on CyberScoop.

CyberScoop favicon CyberScoop β€’ 11 months ago β€’ 1 min read

Cultivating a Hacker Mindset in Cybersecurity Defense

Security isn't just about tools β€” it's about understanding how the enemy thinks and why they make certain choices.

Dark Reading favicon Dark Reading β€’ 11 months ago β€’ 1 min read

Over 300K Prometheus Instances Exposed: Credentials and API Keys Leaking Online

Cybersecurity researchers are warning that thousands of servers hosting the Prometheus monitoring and alerting toolkit are at risk of information leakage and exposure to denial-of-service (DoS) as well as remote code execution (RCE) attacks. "Prometheus servers or exporters, often lacking proper authentication, allowed attackers to easily gather sensitive information, such as credentials and API

The Hacker News favicon The Hacker News β€’ 11 months ago β€’ 1 min read

Black Hat Europe 2024: Can AI systems be socially engineered?

Could attackers use seemingly innocuous prompts to manipulate an AI system and even make it their unwitting ally?

WeLiveSecurity favicon WeLiveSecurity β€’ 11 months ago β€’ 1 min read

Gamaredon Deploys Android Spyware "BoneSpy" and "PlainGnome" in Former Soviet States

The Russia-linked state-sponsored threat actor tracked as Gamaredon has been attributed to two new Android spyware tools called BoneSpy and PlainGnome, marking the first time the adversary has been discovered using mobile-only malware families in its attack campaigns. "BoneSpy and PlainGnome target former Soviet states and focus on Russian-speaking victims," Lookout said in an analysis. "Both

The Hacker News favicon The Hacker News β€’ 11 months ago β€’ 1 min read

Researchers Uncover Symlink Exploit Allowing TCC Bypass in iOS and macOS

Details have emerged about a now-patched security vulnerability in Apple's iOS and macOS that, if successfully exploited, could sidestep the Transparency, Consent, and Control (TCC) framework and result in unauthorized access to sensitive information. The flaw, tracked as CVE-2024-44131 (CVSS score: 5.3), resides in the FileProvider component, per Apple, and has been addressed with improved

The Hacker News favicon The Hacker News β€’ 11 months ago β€’ 1 min read

SaaS Budget Planning Guide for IT Professionals

SaaS services are one of the biggest drivers of OpEx (operating expenses) for modern businesses. With Gartner projecting $247.2 billion in global SaaS spending this year, it’s no wonder SaaS budgets are a big deal in the world of finance and IT. Efficient SaaS utilization can significantly affect both the bottom line and employee productivity. In this article, we’ll break down this topic

The Hacker News favicon The Hacker News β€’ 11 months ago β€’ 1 min read

WordPress Hunk Companion Plugin Flaw Exploited to Silently Install Vulnerable Plugins

Malicious actors are exploiting a critical vulnerability in the Hunk Companion plugin for WordPress to install other vulnerable plugins that could open the door to a variety of attacks. The flaw, tracked as CVE-2024-11972 (CVSS score: 9.8), affects all versions of the plugin prior to 1.9.0. The plugin has over 10,000 active installations. "This flaw poses a significant security risk, as it

The Hacker News favicon The Hacker News β€’ 11 months ago β€’ 1 min read

Europol Dismantles 27 DDoS Attack Platforms Across 15 Nations; Admins Arrested

A global law enforcement operation has failed 27 stresser services that were used to conduct distributed denial-of-service (DDoS) attacks and took them offline as part of a multi-year international exercise called PowerOFF. The effort, coordinated by Europol and involving 15 countries, dismantled several booter and stresser websites, including zdstresser.net, orbitalstress.net, and

The Hacker News favicon The Hacker News β€’ 11 months ago β€’ 1 min read

Chinese Hacker Pwns 81K Sophos Devices With Zero-Day Bug

The US State Department has offered a $10 million reward for Guan Tianfeng, who has been accused of developing and testing a critical SQL injection flaw with a CVSS score of 9.8 used in Sophos attacks.

Dark Reading favicon Dark Reading β€’ 11 months ago β€’ 1 min read

Senators, witnesses: $3B for β€˜rip and replace’ a good start to preventing Salt Typhoon-style breaches

The annual defense spending bill contains money the FCC has sought to use to reimburse telecommunications carriers for removing Chinese equipment. The post Senators, witnesses: $3B for β€˜rip and replace’ a good start to preventing Salt Typhoon-style breaches appeared first on CyberScoop.

CyberScoop favicon CyberScoop β€’ 11 months ago β€’ 1 min read

Krispy Kreme Doughnut Delivery Gets Cooked in Cyberattack

Threat actors punch holes in the company's online ordering systems, tripping up doughnut deliveries across the US after a late November breach.

Dark Reading favicon Dark Reading β€’ 11 months ago β€’ 1 min read

How Cryptocurrency Turns to Cash in Russian Banks

A financial firm registered in Canada has emerged as the payment processor for dozens of Russian cryptocurrency exchanges and websites hawking cybercrime services aimed at Russian-speaking customers, new research finds. Meanwhile, an investigation into the Vancouver street address used by this company shows it is home to dozens of foreign currency dealers, money transfer businesses, and cryptocurrency exchanges -- none...

Krebs on Security favicon Krebs on Security β€’ 11 months ago β€’ 1 min read

Symmetrical Cryptography Pioneer Targets the Post-Quantum Era

Researchers at Cavero have created a correlating numbers mechanism, adding a layer of privacy that even threat actors can't gain enough information to breach.

Dark Reading favicon Dark Reading β€’ 11 months ago β€’ 1 min read

Researchers Crack Microsoft Azure MFA in an Hour

A critical flaw in the company's rate limit for failed sign-in attempts allowed unauthorized access to a user account, including Outlook emails, OneDrive files, Teams chats, Azure Cloud, and more.

Dark Reading favicon Dark Reading β€’ 11 months ago β€’ 1 min read