Sat.Nov 04, 2023

article thumbnail

Apple 'Find My' network can be abused to steal keylogged passwords

Bleeping Computer

Apple's "Find My" location network can be abused by malicious actors to stealthily transmit sensitive information captured by keyloggers installed in keyboards. [.

Passwords 139
article thumbnail

Kinsing threat actors probed the Looney Tunables flaws in recent attacks

Security Affairs

Kinsing threat actors are exploiting the recently disclosed Linux privilege escalation flaw Looney Tunables to target cloud environments. Researchers are cloud security firm Aqua have observed threat actors exploiting the recently disclosed Linux privilege escalation flaw Looney Tunables in attacks against cloud environments. The vulnerability Looney Tunables ( CVE-2023-4911 (CVSS score 7.8)) is a buffer overflow issue that resides in the GNU C Library’s dynamic loader ld.so while processing th

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

StripedFly Malware Operated Unnoticed for 5 Years, Infecting 1 Million Devices

The Hacker News

An advanced strain of malware masquerading as a cryptocurrency miner has managed to fly the radar for over five years, infecting no less than one million devices around the world in the process. That's according to findings from Kaspersky, which has codenamed the threat StripedFly, describing it as an "intricate modular framework that supports both Linux and Windows.

Malware 128
article thumbnail

Discord will switch to temporary file links to block malware delivery

Bleeping Computer

Discord will switch to temporary file links for all users by the end of the year to block attackers from using its CDN (content delivery network) for hosting and pushing malware. [.

Malware 124
article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

This Cheap Hacking Device Can Crash Your iPhone With Pop-Ups

WIRED Threat Level

Plus: SolarWinds is charged with fraud, New Orleans police face recognition has flaws, and new details about Okta’s October data breach emerge.

article thumbnail

DEF CON 31 – Tracy Mosley’s ‘War Stories – Nuthin’ But A G Thang Evolution of Cellular Networks’

Security Boulevard

Many thanks to DEF CON 31 for publishing their terrific DefCon Conference 31 presenters content. Originating from the conference events at Caesars Forum, Flamingo, Harrah’s and Linq in Las Vegas, Nevada ; via the organizations YouTube channel. Permalink The post DEF CON 31 – Tracy Mosley’s ‘War Stories – Nuthin’ But A G Thang Evolution of Cellular Networks’ appeared first on Security Boulevard.