Sat.Dec 31, 2022

article thumbnail

PyTorch discloses malicious dependency chain compromise over holidays

Bleeping Computer

PyTorch has identified a malicious dependency with the same name as the framework's 'torchtriton' library. This has led to a successful compromise via the dependency confusion attack vector. [.].

121
121
article thumbnail

Malvertising campaign MasquerAds abuses Google Ads

Security Affairs

Experts warn of a new Malvertising Campaign abusing Google Ads that targets users searching for popular software. Guardio Labs researchers uncovered a malvertising campaign, tracked as MasquerAds and attributed to a threat actor known as Vermux, that is abusing Google Ads to target users that are searching for popular software. The campaign aims at delivering tainted versions of popular software that deploy malicious payloads on the user’s machine, including info-stealing malware such as R

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Mastodon

Security Boulevard

Like lots of other people, I’m looking at Mastodon as a newer, better tech-social community. I’m trying to auto-post from this site to a Mastodon ID, and I have a separate Mastodon ID that I use for conversation. @cryptosmith@mastodon.social is the conversation one. @cryptosmith@infosec.exchange is the autoposting one. Now, maybe I need to use the […].

52
article thumbnail

Personal health information of 42M Americans leaked between 2016 and 2021

Security Affairs

Crooks have had access to the medical records of 42 million Americans since 2016 as the number of hacks on healthcare organizations doubled. Medical records of 42 million Americans are being sold on the dark web since 2016, this information comes from cyberattacks on healthcare providers. Researchers from Jama Network analyzed trends in ransomware attacks on US hospitals, clinics, and health care delivery organizations between 2016 and 2021.

article thumbnail

The Importance of User Roles and Permissions in Cybersecurity Software

How many people would you trust with your house keys? Chances are, you have a handful of trusted friends and family members who have an emergency copy, but you definitely wouldn’t hand those out too freely. You have stuff that’s worth protecting—and the more people that have access to your belongings, the higher the odds that something will go missing.

article thumbnail

Can I auto-post to Mastodon?

Security Boulevard

I’m reposting this article as part of my tests of auto-posting. In other words, my first attempt wasn’t exactly a success. It appears that I didn’t get my cron working correctly. Like lots of other people, I’m looking at Mastodon as a newer, better tech-social community. I’m trying to auto-post from this site to a […]. The post Can I auto-post to Mastodon?

52
article thumbnail

Update Android Right Now to Fix a Scary Remote-Execution Flaw

WIRED Threat Level

Plus: Patches for Apple iOS 16, Google Chrome, Windows 10, and more.

Hacking 78