Remove tag drones
article thumbnail

Multiple APT groups exploited WinRAR flaw CVE-2023-38831

Security Affairs

Google TAG reported that both Russia and China-linked threat actors are weaponizing the a high-severity vulnerability in WinRAR. Google’s Threat Analysis Group (TAG) reported that in recent weeks multiple nation-state actors were spotted exploiting the vulnerability CVE-2023-38831 in WinRAR. ” reported Google TAG.

article thumbnail

Tracking the Trackers: For Better or Worse

SecureWorld News

These radios are being tracked and tagged by marketers, telecom companies and individuals in an effort to resell that data to parties willing to pay. Tiny BLE (Bluetooth Low Energy) tags are being placed in people’s vehicles, pockets, bags and other items on the move all the time.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Russia-linked APT29 group exploited WinRAR 0day in attacks against embassies

Security Affairs

In April, Google observed Russia-linked FROZENBARENTS APT (aka SANDWORM) impersonates Ukrainian drone training school to deliver the Rhadamanthys infostealer. Google TAG experts also observed the Russia-linked ATP28 group exploiting the flaw in attacks against Ukraine users.

Hacking 103
article thumbnail

Computers and Video Surveillance

Schneier on Security

And finally, the cameras themselves have become cheaper, more ubiquitous, and much better; cameras mounted on drones can effectively watch an entire city. Wide-area surveillance" cameras can be mounted on airplanes and drones , and can operate continuously. The result is a level of surveillance that was impossible just a few years ago.

article thumbnail

Advanced threat predictions for 2023

SecureList

Last June, Google’s TAG team released a blog post documenting attacks on Italian and Kazakh users that they attribute to RCS Lab, an Italian offensive software vendor. Drone hacking! This final prediction concerns itself with the other way around: the use of commercial-grade drones to enable proximity hacking.

Firmware 106
article thumbnail

Advanced threat predictions for 2024

SecureList

Drone hacking! Although there was a public report of drones used to hack a Wi-Fi network in 2022, there are no accounts of similar events happening in 2023. If an attacker is able to obtain these private keys, they could sign their malware, so that the code is trusted and run by MSI computers. Verdict: prediction fulfilled ✅ 8.

Hacking 101