Sat.Nov 04, 2023

article thumbnail

Apple 'Find My' network can be abused to steal keylogged passwords

Bleeping Computer

Apple's "Find My" location network can be abused by malicious actors to stealthily transmit sensitive information captured by keyloggers installed in keyboards. [.

Passwords 143
article thumbnail

StripedFly Malware Operated Unnoticed for 5 Years, Infecting 1 Million Devices

The Hacker News

An advanced strain of malware masquerading as a cryptocurrency miner has managed to fly the radar for over five years, infecting no less than one million devices around the world in the process. That's according to findings from Kaspersky, which has codenamed the threat StripedFly, describing it as an "intricate modular framework that supports both Linux and Windows.

Malware 113
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Discord will switch to temporary file links to block malware delivery

Bleeping Computer

Discord will switch to temporary file links for all users by the end of the year to block attackers from using its CDN (content delivery network) for hosting and pushing malware. [.

Malware 135
article thumbnail

Kinsing threat actors probed the Looney Tunables flaws in recent attacks

Security Affairs

Kinsing threat actors are exploiting the recently disclosed Linux privilege escalation flaw Looney Tunables to target cloud environments. Researchers are cloud security firm Aqua have observed threat actors exploiting the recently disclosed Linux privilege escalation flaw Looney Tunables in attacks against cloud environments. The vulnerability Looney Tunables ( CVE-2023-4911 (CVSS score 7.8)) is a buffer overflow issue that resides in the GNU C Library’s dynamic loader ld.so while processing th

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

This Cheap Hacking Device Can Crash Your iPhone With Pop-Ups

WIRED Threat Level

Plus: SolarWinds is charged with fraud, New Orleans police face recognition has flaws, and new details about Okta’s October data breach emerge.

article thumbnail

DEF CON 31 – Tracy Mosley’s ‘War Stories – Nuthin’ But A G Thang Evolution of Cellular Networks’

Security Boulevard

Many thanks to DEF CON 31 for publishing their terrific DefCon Conference 31 presenters content. Originating from the conference events at Caesars Forum, Flamingo, Harrah’s and Linq in Las Vegas, Nevada ; via the organizations YouTube channel. Permalink The post DEF CON 31 – Tracy Mosley’s ‘War Stories – Nuthin’ But A G Thang Evolution of Cellular Networks’ appeared first on Security Boulevard.