Remove category videos
article thumbnail

Chaining Zoom bugs is possible to hack users in a chat by sending them a message

Security Affairs

A set of four security flaws in the popular video conferencing service Zoom could be exploited to compromise another user over chat by sending specially crafted Extensible Messaging and Presence Protocol ( XMPP ) messages. Please vote for Security Affairs and Pierluigi Paganini in every category that includes them (e.g. in severity.

Hacking 142
article thumbnail

Deepfake cyberthreats – The next evolution

CyberSecurity Insiders

This blog was written by an independent guest blogger. Among these categories, the following were deemed the highest risk: Audio/video impersonation. In 2019, we published an article about deepfakes and the technology behind them. At the time, the potential criminal applications of this technology were limited.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How I pwned an ex-CISO and the Smashing Security Podcast

Javvad Malik

Of course texting a friend and getting a response doesn’t really fall under that category. For those who can’t be bothered watching the video. It would be a really poor world if we distrusted everyone and everything. Annoying security people brings so much joy to life.

article thumbnail

Weekly Update 112

Troy Hunt

Passwords suck and they must die, they're never going to die, people are using bad ones, people should be able to use bad ones, developers are at fault and my personal favourite in the "how on earth did you reach that conclusion" category, I should actually do something to educate people about passwords rather than blaming them for using bad ones.

Passwords 142
article thumbnail

Exposed: the threat actors who are poisoning Facebook

Security Affairs

video scam led Cybernews researchers into exposing threat actors who are poisoning Facebook. video scam has led Cybernews researchers to a cybercriminal stronghold, from which threat actors have been infecting the social media giant with thousands of malicious links every day. An investigation of the infamous “Is That You?”

Scams 129
article thumbnail

GoodWill Ransomware victims have to perform socially driven activities to decryption their data

Security Affairs

In addition, the victims can accompany less fortunate children to Dominos, Pizza Hut or KFC for a treat, take pictures and videos, and post them on social media. Please vote for Security Affairs and Pierluigi Paganini in every category that includes them (e.g. said the researchers. To nominate, please visit:?. Pierluigi Paganini.

article thumbnail

How You Can Start Learning Malware Analysis

Lenny Zeltser

I like grouping them in 4 categories, which I detailed in the post Mastering 4 Stages of Malware Analysis. There, you’ll see website and blogs that I like to read to keep up with the industry. I shared my recommendations for doing this in the blog post 5 Steps to Building a Malware Analysis Toolkit Using Free Tools.

Malware 145