FreshRSS

πŸ”’
❌ About FreshRSS
There are new available articles, click to refresh the page.
Before yesterdayYour RSS feeds

It Was a Good Month for Fighting Cybercrimeβ€”Don’t Get Comfortable

By Lily Hay Newman
Even as police and tech companies get better at shutting down illicit operations, cybercrime is worse than ever.

Hackers Are Getting Caught Exploiting New Bugs More Than Ever

By Lily Hay Newman
A pair of reports from Mandiant and Google found a spike in zero-day vulnerabilities in 2021. The question is, why?

North Koreans Are Jailbreaking Phones to Access Forbidden Media

By Andy Greenberg
A new report suggests that a small but vibrant group of smartphones hackers may be challenging the world's most digitally restrictive regime.

Russia Is Being Hacked at an Unprecedented Scale

By Matt Burgess
From β€œIT Army” DDoS attacks to custom malware, the country has become a target like never before.

You Need to Update iOS, Android, and Chrome Right Now

By Kate O'Flaherty
Plus: Microsoft patched some 100 flaws, while Oracle issued more than 500 security fixes.

One of the Most Powerful DDoS Attacks Ever Hits a Crypto Platform

By Dan Goodin, Ars Technica
The onslaught was delivered through HTTPS, which puts more strain on a target, and it suggests that attackers are getting more powerful.

Attackers Use Event Logs to Hide Fileless Malware

By Nate Nelson
A sophisticated campaign utilizes a novel anti-detection method.

China-linked APT Caught Pilfering Treasure Trove of IP

By Nate Nelson
A state-sponsored threat actor designed a house-of-cards style infection chain to exfiltrate massive troves of highly sensitive data.

VHD Ransomware Linked to North Korea’s Lazarus Group

By Elizabeth Montalbano
Source code and Bitcoin transactions point to the malware, which emerged in March 2020, being the work of APT38, researchers at Trellix said.

USB-based Wormable Malware Targets Windows Installer

By Elizabeth Montalbano
Activity dubbed β€˜Raspberry Robin’ uses Microsoft Standard Installer and other legitimate processes to communicate with threat actors and execute nefarious commands.

FBI: Rise in Business Email-based Attacks is a $43B Headache

By Sagar Tiwari
A huge spike in fraudulent activities related to attacks leveraging business email accounts is a billion-dollar-problem.

Hackers Actively Exploit F5 BIG-IP Bug

By Threatpost
The bug has a severe rating of 9.8, public exploits are released.

Novel Phishing Trick Uses Weird Links to Bypass Spam Filters

By Nate Nelson
A novel form of phishing takes advantage of a disparity between how browsers and email inboxes read web domains.

Android 13 Tries to Make Privacy and Security a No-Brainer

By Lily Hay Newman
With its latest mobile OS update, Google aims to simplify the adoption of Android’s protective features for users and developers alike.

The Case for War Crimes Charges Against Russia’s Sandworm Hackers

By Andy Greenberg
A group of human rights lawyers and investigators has called on the Hague to bring the first-ever β€œcyber war crimes” charges against Russia’s most dangerous hackers.

The Hidden Race to Protect the US Bioeconomy From Hacker Threats

By Lily Hay Newman
A biotech threat intelligence group is gaining supporters as urgency mounts around an overlooked vulnerable sector.

Malware Builder Leverages Discord Webhooks

By Nate Nelson
Researchers discovered a simple malware builder designed to steal credentials, then pinging them to Discord webhooks.

Sysrv-K Botnet Targets Windows, Linux

By Sagar Tiwari
Microsoft researchers say they are tracking a botnet that is leveraging bugs in the Spring Framework and WordPress plugins.

Sysrv-K Botnet Targets Windows, Linux

By Sagar Tiwari
Microsoft researchers say they are tracking a botnet that is leveraging bugs in the Spring Framework and WordPress plugins.

Your iPhone Is Vulnerable to a Malware Attack Even When It’s Off

By Dan Goodin, Ars Technica
Researchers found a way to exploit the tech that enables Apple’s Find My feature, which could allow attackers to track location when a device is powered down.

This Hacktivist Site Lets You Prank Call Russian Officials

By Andy Greenberg
To protest the war in Ukraine, WasteRussianTime.today auto-dials Russian government officials, connects them to each other, and lets you listen in to their confusion.

APTs Overwhelmingly Share Known Vulnerabilities Rather Than Attack O-Days

By Elizabeth Montalbano
Research indicates that organizations should make patching existing flaws a priority to mitigate risk of compromise.

APTs Overwhelmingly Share Known Vulnerabilities Rather Than Attack O-Days

By Elizabeth Montalbano
Research indicates that organizations should make patching existing flaws a priority to mitigate risk of compromise.

Spyware Vendors Target Android With Zero-Day Exploits

By Lily Hay Newman
New research from Google's Threat Analysis Group outlines the risks Android users face from the surveillance-for-hire industry.

North Korean IT Workers Are Infiltrating Tech Companies

By Matt Burgess
Plus: The Conti ransomware gang shuts down, Canada bans Huawei and ZTE, and more of the week’s top security news.

β€˜Tough to Forge’ Digital Driver’s Licenses Areβ€”Yepβ€”Easy to Forge

By Dan Goodin, Ars Technica
Researchers found a litany of security flaws that allow simple, quick, and cheap forgeries in Australia.

Cybergang Claims REvil is Back, Executes DDoS Attacks

By Elizabeth Montalbano
Actors claiming to be the defunct ransomware group are targeting one of Akami’s customers with a Layer 7 attack, demanding an extortion payment in Bitcoin.

Cybergang Claims REvil is Back, Executes DDoS Attacks

By Elizabeth Montalbano
Actors claiming to be the defunct ransomware group are targeting one of Akami’s customers with a Layer 7 attack, demanding an extortion payment in Bitcoin.

The Mystery of China’s Sudden Warnings About US Hackers

By Matt Burgess
The Chinese government recently began saber-rattling about American cyberespionage. The catch? It’s all old news.

DuckDuckGo Isn’t as Private as You Think

By Andy Greenberg
Plus: A $150 million Twitter fine, a massive leak from a Chinese prison in Xinjiang, and an ISIS plot to assassinate George W. Bush.

Microsoft Releases Workaround for β€˜One-Click’ 0Day Under Active Attack

By Elizabeth Montalbano
Threat actors already are exploiting vulnerability, dubbed β€˜Follina’ and originally identified back in April, to target organizations in Russia and Tibet, researchers said.

Microsoft Releases Workaround for β€˜One-Click’ 0Day Under Active Attack

By Elizabeth Montalbano
Threat actors already are exploiting vulnerability, dubbed β€˜Follina’ and originally identified back in April, to target organizations in Russia and Tibet, researchers said.

Scammers Target NFT Discord Channel

By Sagar Tiwari
Hackers escalate phishing and scamming attacks to exploit popular Discord bot and persuade users to click on the malicious links.

Scammers Target NFT Discord Channel

By Sagar Tiwari
Hackers escalate phishing and scamming attacks to exploit popular Discord bot and persuade users to click on the malicious links.

Evil Corp Pivots LockBit to Dodge U.S. Sanctions

By Elizabeth Montalbano
The cybercriminal group is distancing itself from its previous branding by shifting tactics and tools once again in an aim to continue to profit from its nefarious activity.

Evil Corp Pivots LockBit to Dodge U.S. Sanctions

By Elizabeth Montalbano
The cybercriminal group is distancing itself from its previous branding by shifting tactics and tools once again in an aim to continue to profit from its nefarious activity.

An Actively Exploited Microsoft Zero-Day Flaw Still Has No Patch

By Lily Hay Newman
The company continues to downplay the severity of the Follina vulnerability, which remains present in all supported versions of Windows.

Google May Owe You a Chunk of $100 Million

By Andrew Couts
Plus: The US admits to cyber operations supporting Ukraine, SCOTUS investigates its own, and a Michael Flynn surveillance mystery is solved.

The Hacker Gold Rush That's Poised to Eclipse Ransomware

By Lily Hay Newman
As governments crack down on ransomware, cybercriminals may soon shift to business email compromiseβ€”already the world's most profitable type of scam.

AlphaBay Is Taking Over the Dark Webβ€”Again

By Andy Greenberg
Five years after it was torn offline, the resurrected dark web marketplace is clawing its way back to the top of the online underworld.

Follina Exploited by State-Sponsored Hackers

By Nate Nelson
A government-aligned attacker tried using a Microsoft vulnerability to attack U.S. and E.U. government targets.

Follina Exploited by State-Sponsored Hackers

By Nate Nelson
A government-aligned attacker tried using a Microsoft vulnerability to attack U.S. and E.U. government targets.

A Long-Awaited Defense Against Data Leaks May Have Just Arrived

By Lily Hay Newman
MongoDB claims its new β€œQueryable Encryption” lets users search their databases while sensitive data stays encrypted. Oh, and its cryptography is open source.

Hackers Can Steal Your Tesla by Creating Their Own Personal Keys

By Dan Goodin, Ars Technica
A researcher found that a recent update lets anyone enroll their own key during the 130-second interval after the car is unlocked with an NFC card.

Conti's Attack Against Costa Rica Sparks a New Ransomware Era

By Matt Burgess
A pair of ransomware attacks crippled parts of the countryβ€”and rewrote the rules of cybercrime.

Bluetooth Signals Can Be Used to Track Smartphones, Say Researchers

By Sagar Tiwari
Researchers demonstrated a possible way to track individuals via Bluetooth signals.

Bluetooth Signals Can Be Used to Track Smartphones, Say Researchers

By Sagar Tiwari
Researchers demonstrated a possible way to track individuals via Bluetooth signals.

Russia Is Taking Over Ukraine’s Internet

By Matt Burgess
In occupied Ukraine, people’s internet is being routed to Russiaβ€”and subjected to its powerful censorship and surveillance machine.

Travel-related Cybercrime Takes Off as Industry Rebounds

By Sagar Tiwari
Upsurge in the tourism industry after the COVID-19 pandemic grabs the attention of cybercriminals to scam the tourists.

DragonForce Gang Unleash Hacks Against Govt. of India

By Nate Nelson
In response to a comment about the Prophet Mohammed, a hacktivist group in Malaysia has unleashed a wave of cyber attacks in India.

Travel-related Cybercrime Takes Off as Industry Rebounds

By Sagar Tiwari
Upsurge in the tourism industry after the COVID-19 pandemic grabs the attention of cybercriminals to scam the tourists.

DragonForce Gang Unleash Hacks Against Govt. of India

By Nate Nelson
In response to a comment about the Prophet Mohammed, a hacktivist group in Malaysia has unleashed a wave of cyber attacks in India.

Facebook Messenger Scam Duped Millions

By Nate Nelson
One well crafted phishing message sent via Facebook Messenger ensnared 10 million Facebook users and counting.

Facebook Messenger Scam Duped Millions

By Nate Nelson
One well crafted phishing message sent via Facebook Messenger ensnared 10 million Facebook users and counting.

Police Linked to Hacking Campaign to Frame Indian Activists

By Andy Greenberg
New details connect police in India to a plot to plant evidence on victims' computers that led to their arrest.

Here’s Why You’re Still Stuck in Robocall Hell

By Lily Hay Newman
Despite major progress fighting spam and scams, the roots of the problem go far deeper than your phone company’s defenses.

An Alleged Russian Spy Was Busted Trying to Intern at The Hague

By Matt Burgess
Plus: Firefox adds new privacy protections, a big Intel and AMD chip flaw, and more of the week’s top security news.

The Ghost of Internet Explorer Will Haunt the Web for Years

By Lily Hay Newman
Microsoft's legacy browser may be deadβ€”but its remnants are not going anywhere, and neither are its lingering security risks.
❌