Remove tag coding
article thumbnail

Google TAG spotted actors using new code signing tricks to evade detection

Security Affairs

Researchers from Google’s TAG team reported that financially motivated actors are using new code signing tricks to evade detection. Researchers from Google’s Threat Analysis Group reported that financially motivated actors are using new code signing tricks to evade detection. ” read the analysis published by Google TAG.

Software 115
article thumbnail

CISA adds Google Chromium V8 Type Confusion bug to its Known Exploited Vulnerabilities catalog

Security Affairs

The vulnerability impacts Google Chrome prior to 116.0.5845.179, it allows a remote attacker to execute arbitrary code via a crafted HTML page. TAG observed these exploits delivered in two different ways: the MITM injection and via one-time links sent directly to the target. reads the analysis published by Google TAG. “We

Spyware 104
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

North Korea-linked threat actors target cybersecurity experts with a zero-day

Security Affairs

The attacks that took place in the past weeks were detected by researchers at Google’s Threat Analysis Group (TAG). “Recently, TAG became aware of a new campaign likely from the same actors based on similarities with the previous campaign. ” reads the advisory published by Google TAG.

article thumbnail

Recently patched Apple and Chrome zero-days exploited to infect devices in Egypt with Predator spyware

Security Affairs

Citizen Lab and Google’s TAG revealed that the three recently patched Apple zero-days were used to install Cytrox Predator spyware. CVE-2023-41993 is an arbitrary code execution issue that resides in the Webkit. TAG experts explained that they were unable to capture the full Predator implant.

Spyware 108
article thumbnail

Crickets from Chirp Systems in Smart Lock Key Leak

Krebs on Security

government is warning that “smart locks” securing entry to an estimated 50,000 dwellings nationwide contain hard-coded credentials that can be used to remotely open any of the locks. The lock’s maker Chirp Systems remains unresponsive, even though it was first notified about the critical weakness in March 2021.

Software 281
article thumbnail

CVE-2024-21378 — Remote Code Execution in Microsoft Outlook 

NetSpi Technical

In 2023 NetSPI discovered that Microsoft Outlook was vulnerable to authenticated remote code execution (RCE) via synced form objects. Note, a pull request containing the proof-of-concept code is forthcoming to provide organizations with sufficient time to patch. However, the syncing capability of these form objects was never altered.

article thumbnail

Burger King forgets to put a password on their systems, again

Security Affairs

If a threat actor is able to find and exploit an arbitrary PHP code execution vulnerability within the site, the credentials within.env could allow easier and more stealthy extraction of the MySQL database. Another piece of sensitive information that the research team observed included a Google Tag Manager ID.