Google Accuses Spanish Spyware Vendor of Exploiting Chrome, Firefox, & Windows Zero-Days

google-accuses-spanish-spyware-vendor-of-exploiting-chrome,-firefox,-&-windows-zero-days

A Barcelona-based surveillanceware vendor named Variston IT is said to have surreptitiously planted spyware on targeted devices by exploiting several zero-day flaws in Google Chrome, Mozilla Firefox, and Windows, some of which date back to December 2018. “Their Heliconia framework exploits n-day vulnerabilities in Chrome, Firefox, and Microsoft Defender, and provides all the tools necessary […]

Hackers Leak Another Set of Medibank Customer Data on the Dark Web

hackers-leak-another-set-of-medibank-customer-data-on-the-dark-web

Medibank on Thursday confirmed that the threat actors behind the devastating cyber attack have posted another dump of data stolen from its systems on the dark web after its refusal to pay a ransom. “We are in the process of analyzing the data, but the data released appears to be the data we believed the […]

Researchers Disclose Critical RCE Vulnerability Affecting Quarkus Java Framework

researchers-disclose-critical-rce-vulnerability-affecting-quarkus-java-framework

A critical security vulnerability has been disclosed in the Quarkus Java framework that could be potentially exploited to achieve remote code execution on affected systems. Tracked as CVE-2022-4116 (CVSS score: 9.8), the shortcoming could be trivially abused by a malicious actor without any privileges. “The vulnerability is found in the Dev UI Config Editor, which […]

What Developers Need to Fight the Battle Against Common Vulnerabilities

what-developers-need-to-fight-the-battle-against-common-vulnerabilities

Today’s threat landscape is constantly evolving, and now more than ever, organizations and businesses in every sector have a critical need to consistently produce and maintain secure software. While some verticals – like the finance industry, for example – have been subject to regulatory and compliance requirements for some time, we are seeing a steady […]

Schoolyard Bully Trojan Apps Stole Facebook Credentials from Over 300,000 Android Users

schoolyard-bully-trojan-apps-stole-facebook-credentials-from-over-300,000-android-users

More than 300,000 users across 71 countries have been victimized by a new Android threat campaign called the Schoolyard Bully Trojan. Mainly designed to steal Facebook credentials, the malware is camouflaged as legitimate education-themed applications to lure unsuspecting users into downloading them. The apps, which were available for download from the official Google Play Store, […]

Researchers ‘Accidentally’ Crash KmsdBot Cryptocurrency Mining Botnet Network

researchers-‘accidentally’-crash-kmsdbot-cryptocurrency-mining-botnet-network

An ongoing analysis into an up-and-coming cryptocurrency mining botnet known as KmsdBot has led to it being accidentally taken down. KmsdBot, as christened by the Akamai Security Intelligence Response Team (SIRT), came to light mid-November 2022 for its ability to brute-force systems with weak SSH credentials. The botnet strikes both Windows and Linux devices spanning […]

LastPass Suffers Another Security Breach; Exposed Some Customers Information

lastpass-suffers-another-security-breach;-exposed-some-customers-information

Popular password management service LastPass said it’s investigating a second security incident that involved attackers accessing some of its customer information. “We recently detected unusual activity within a third-party cloud storage service, which is currently shared by both LastPass and its affiliate, GoTo,” LastPass CEO Karim Toubba said. GoTo, formerly called LogMeIn, acquired LastPass in […]

North Korea Hackers Using New “Dolphin” Backdoor to Spy on South Korean Targets

north-korea-hackers-using-new-“dolphin”-backdoor-to-spy-on-south-korean-targets

The North Korea-linked ScarCruft group has been attributed to a previously undocumented backdoor called Dolphin that the threat actor has used against targets located in its southern counterpart. “The backdoor […] has a wide range of spying capabilities, including monitoring drives and portable devices and exfiltrating files of interest, keylogging and taking screenshots, and stealing […]

Researchers Find a Way Malicious NPM Libraries Can Evade Vulnerability Detection

researchers-find-a-way-malicious-npm-libraries-can-evade-vulnerability-detection

New findings from cybersecurity firm JFrog show that malware targeting the npm ecosystem can evade security checks by taking advantage of an “unexpected behavior” in the npm command line interface (CLI) tool. npm CLI’s install and audit commands have built-in capabilities to check a package and all of its dependencies for known vulnerabilities, effectively acting […]

This Malicious App Abused Hacked Devices to Create Fake Accounts on Multiple Platforms

this-malicious-app-abused-hacked-devices-to-create-fake-accounts-on-multiple-platforms

A malicious Android SMS application discovered on the Google Play Store has been found to stealthily harvest text messages with the goal of creating accounts on a wide range of platforms like Facebook, Google, and WhatsApp. The app, named Symoo (com.vanjan.sms), had over 100,000 downloads and functioned as a relay for transmitting messages to a […]