Sat.May 25, 2024

article thumbnail

Fake AV websites used to distribute info-stealer malware

Security Affairs

Threat actors used fake AV websites masquerading as legitimate antivirus products from Avast, Bitdefender, and Malwarebytes to distribute malware. In mid-April 2024, researchers at Trellix Advanced Research Center team spotted multiple fake AV sites used to distribute info-stealers. The malicious websites hosted sophisticated malicious files such as APK, EXE and Inno setup installer, including Spy and Stealer capabilities.

Malware 137
article thumbnail

Experts Find Flaw in Replicate AI Service Exposing Customers' Models and Data

The Hacker News

Cybersecurity researchers have discovered a critical security flaw in an artificial intelligence (AI)-as-a-service provider Replicate that could have allowed threat actors to gain access to proprietary AI models and sensitive information.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MITRE December 2023 attack: Threat actors created rogue VMs to evade detection

Security Affairs

The MITRE Corporation revealed that threat actors behind the December 2023 attacks created rogue virtual machines (VMs) within its environment. The MITRE Corporation has provided a new update about the December 2023 attack. In April 2024, MITRE disclosed a security breach in one of its research and prototyping networks. The security team at the organization promptly launched an investigation, logged out the threat actor, and engaged third-party forensics Incident Response teams to conduct indepe

Risk 127
article thumbnail

Arc browser’s Windows launch targeted by Google ads malvertising

Bleeping Computer

A new Google Ads malvertising campaign, coinciding with the launch of the Arc web browser for Windows, was tricking people into downloading trojanized installers that infect them with malware payloads. [.

Malware 105
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Microsoft’s New Recall AI Tool May Be a ‘Privacy Nightmare’

WIRED Threat Level

Plus: US surveillance reportedly targets pro-Palestinian protesters, the FBI arrests a man for AI-generated CSAM, and stalkerware targets hotel computers.

article thumbnail

Indian man stole $37 million in crypto using fake Coinbase Pro site

Bleeping Computer

An Indian national pleaded guilty to wire fraud conspiracy for stealing over $37 million through a fake Coinbase website used to steal credentials. [.

article thumbnail

Grab the best weatherproof Wyze Cam alternative for just $40 this Memorial Day right now

Zero Day

The newest version of the Blink Mini sees key improvements that make it worthy even for non-budget shoppers. This Memorial Day deal is the best chance to save on home security.

52