[ad_1] Nov 06, 2023NewsroomCyber War / Malware Israeli higher education and tech sectors have been targeted as part of a series of destructive cyber attacks that commenced in January 2023 with an aim to deploy previously undocumented wiper malware. The intrusions, which took place as recently as October, have been attributed to an Iranian nation-state…
Month: November 2023
CanesSpy Spyware Discovered in Modified WhatsApp Versions
[ad_1] Nov 03, 2023NewsroomSpyware / Mobile Security Cybersecurity researchers have unearthed a number of WhatsApp mods for Android that come fitted with a spyware module dubbed CanesSpy. These modified versions of the instant messaging app have been observed propagated via sketchy websites advertising such modded software as well as Telegram channels used primarily by Arabic…
Outcomes Demonstrate All AI is Not Created Equally
[ad_1] Nov 03, 2023The Hacker NewsArtificial Intelligence / Cyber Threat Here is what matters most when it comes to artificial intelligence (AI) in cybersecurity: Outcomes. As the threat landscape evolves and generative AI is added to the toolsets available to defenders and attackers alike, evaluating the relative effectiveness of various AI-based security offerings is increasingly…
Google Play Store Introduces ‘Independent Security Review’ Badge for Apps
[ad_1] Nov 04, 2023NewsroomMobile Security / Android Google is rolling out an “Independent security review” badge in the Play Store’s Data safety section for Android apps that have undergone a Mobile Application Security Assessment (MASA) audit. “We’ve launched this banner beginning with VPN apps due to the sensitive and significant amount of user data these…
StripedFly Malware Operated Unnoticed for 5 Years, Infecting 1 Million Devices
[ad_1] An advanced strain of malware masquerading as a cryptocurrency miner has managed to fly the radar for over five years, infecting no less than one million devices around the world in the process. That’s according to findings from Kaspersky, which has codenamed the threat StripedFly, describing it as an “intricate modular framework that supports…
Okta’s Recent Customer Support Data Breach Impacted 134 Customers
[ad_1] Nov 04, 2023NewsroomData Breach / Cyber Attack Identity and authentication management provider Okta on Friday disclosed that the recent support case management system breach affected 134 of its 18,400 customers. It further noted that the unauthorized intruder gained access to its systems from September 28 to October 17, 2023, and ultimately accessed HAR files…
NodeStealer Malware Hijacking Facebook Business Accounts for Malicious Ads
[ad_1] Nov 03, 2023NewsroomOnline Security / Malware Compromised Facebook business accounts are being used to run bogus ads that employ “revealing photos of young women” as lures to trick victims into downloading an updated version of a malware called NodeStealer. “Clicking on ads immediately downloads an archive containing a malicious .exe ‘Photo Album’ file which…
Kinsing Actors Exploiting Recent Linux Flaw to Breach Cloud Environments
[ad_1] Nov 03, 2023NewsroomCloud Security / Linux The threat actors linked to Kinsing have been observed attempting to exploit the recently disclosed Linux privilege escalation flaw called Looney Tunables as part of a “new experimental campaign” designed to breach cloud environments. “Intriguingly, the attacker is also broadening the horizons of their cloud-native attacks by extracting…
FIRST Announces CVSS 4.0 – New Vulnerability Scoring System
[ad_1] Nov 02, 2023NewsroomVulnerability Assessment The Forum of Incident Response and Security Teams (FIRST) has officially announced CVSS v4.0, the next generation of the Common Vulnerability Scoring System standard, more than eight years after the release of CVSS v3.0 in June 2015. “This latest version of CVSS 4.0 seeks to provide the highest fidelity of…
Researchers Find 34 Windows Drivers Vulnerable to Full Device Takeover
[ad_1] Nov 02, 2023NewsroomEndpoint Security / Malware As many as 34 unique vulnerable Windows Driver Model (WDM) and Windows Driver Frameworks (WDF) drivers could be exploited by non-privileged threat actors to gain full control of the devices and execute arbitrary code on the underlying systems. “By exploiting the drivers, an attacker without privilege may erase/alter…









