Category: security

“With KeyTrap, an attacker could completely disable large parts of the worldwide Internet” — this deceptively simple cyberattack could spell doom for apps everywhere

Security researchers have discovered a major flaw in the DNS system that could “completely disable” large parts of the worldwide Internet for extended periods of time. Cybersecurity researchers from the National Research Center for Applied Cybersecurity ATHENE, Goethe University Frankfurt, Fraunhofer SIT, and the Technical University of Darmstadt, recently found…

Read More

Notorious NSO Group exploits flaw to send malicious messages and more

Notorious Israeli commercial spyware company NSO Group was reportedly offering a way to exfiltrate sensitive mobile phone data unlike anything ever seen before, experts have revealed.  A new report from telecom security specialists Enea discovered the method while recently sifting through the documents filed during the court case between WhatsApp…

Read More

The FTC bans AI impersonations of individuals — and unveils greater powers to win stolen money back

The Federal Trade Commission (FTC) has moved to ban the practice of using AI tools to spoof individuals, as well as announcing greater powers to win stolen money back from scammers. The agency said that it is “taking this action in light of surging complaints around impersonation fraud, as well as public…

Read More

Qakbot returns — devious new malware tricks victims by using a fake Adobe installer

The infamous Qakbot malware is back, and sporting some interesting improvements, experts have warned. Cybersecurity researchers from Sophos have observed new distribution campaigns for Qakbot, the malware now comes with a fake Windows installer. Once the victim clicks on the malware, it displays a bogus installer for an Adobe product. …

Read More

This new malware can literally steal your face to use in fraud — Android and iOS devices both affected, so be on your guard

Cybersecurity researchers have discovered a new mobile trojan that literally looks to steal people’s faces to hack into theiraccounts. The GoldPickaxe trojan steals biometric data and uses it to generate convincing deepfakes which can then be used to break into mobile banking applications, a report from Group-IB says. GoldPickaxe is…

Read More

Ivanti Pulse Secure was using decade-old Linux and outdated libraries — no wonder it was such a popular target for hackers

Knowing which operating system, as well as libraries, Ivanti Pulse Secure used, it is no wonder hackers keep finding new zero-day vulnerabilities to exploit. That’s the conclusion of security analysts from Eclypsium, who analyzed firmware version 9.1.18.2-24467.1 and concluded that the operating system used was CentOS 6.4. “Pulse Secure runs…

Read More