Tag: malware
-
The Register: Fortinet patches VPN app flaw that could give rogue users, malware a privilege boost
Source URL: https://www.theregister.com/2024/11/14/fortinet_vpn_authentication_bypass_bug/ Source: The Register Title: Fortinet patches VPN app flaw that could give rogue users, malware a privilege boost Feedly Summary: Plus a bonus hard-coded local API key A now-patched, high-severity bug in Fortinet’s FortiClient VPN application potentially allows a low-privilege rogue user or malware on a vulnerable Windows system to gain higher…
-
Simon Willison’s Weblog: PyPI now supports digital attestations
Source URL: https://simonwillison.net/2024/Nov/14/pypi-digital-attestations/#atom-everything Source: Simon Willison’s Weblog Title: PyPI now supports digital attestations Feedly Summary: PyPI now supports digital attestations Dustin Ingram: PyPI package maintainers can now publish signed digital attestations when publishing, in order to further increase trust in the supply-chain security of their projects. Additionally, a new API is available for consumers and…
-
Cisco Talos Blog: New PXA Stealer targets government and education sectors for sensitive information
Source URL: https://blog.talosintelligence.com/new-pxa-stealer/ Source: Cisco Talos Blog Title: New PXA Stealer targets government and education sectors for sensitive information Feedly Summary: Cisco Talos discovered a new information stealing campaign operated by a Vietnamese-speaking threat actor targeting government and education entities in Europe and Asia. AI Summary and Description: Yes Summary: The text discusses a threat…
-
Hacker News: North Korean hackers create Flutter apps to bypass macOS security
Source URL: https://www.bleepingcomputer.com/news/security/north-korean-hackers-create-flutter-apps-to-bypass-macos-security/ Source: Hacker News Title: North Korean hackers create Flutter apps to bypass macOS security Feedly Summary: Comments AI Summary and Description: Yes Summary: North Korean threat actors are exploiting macOS by creating trojanized applications, particularly targeting cryptocurrency themes, that bypass Apple’s security mechanisms. These apps, developed using the Flutter framework, present a…
-
Krebs on Security: FBI: Spike in Hacked Police Emails, Fake Subpoenas
Source URL: https://krebsonsecurity.com/2024/11/fbi-spike-in-hacked-police-emails-fake-subpoenas/ Source: Krebs on Security Title: FBI: Spike in Hacked Police Emails, Fake Subpoenas Feedly Summary: The Federal Bureau of Investigation (FBI) is urging police departments and governments worldwide to beef up security around their email systems, citing a recent increase in cybercriminal services that use hacked police email accounts to send unauthorized…
-
The Register: Winos4.0 abuses gaming apps to infect, control Windows machines
Source URL: https://www.theregister.com/2024/11/08/winos40_targets_windows/ Source: The Register Title: Winos4.0 abuses gaming apps to infect, control Windows machines Feedly Summary: ‘Multiple’ malware samples likely targeting education orgs Criminals are using game-related applications to infect Windows systems with a malicious software framework called Winos4.0 that gives the attackers full control over compromised machines.… AI Summary and Description: Yes…