Category: EN

Introducing Jon Ericson

From the very beginning of the project, OpenSSL has depended on a community of experts to enable secure and private communication. It’s safe to say that without volunteers contributing code, tests and documentation, we wouldn’t have the modern internet. In…

WhatsApp spear phishing campaign uses QR codes to add device

A cybercriminal campaign linked to Russia is deploying QR codes to access the WhatsApp accounts of high-profile targets like journalists, members… This article has been indexed from Malwarebytes Read the original article: WhatsApp spear phishing campaign uses QR codes to…

Microsoft exposes WhatsApp Spear Phishing Campaign of Star Blizzard

Microsoft’s Threat Intelligence teams have uncovered and exposed a spear phishing campaign targeting WhatsApp accounts, attributed to the Russian-linked hacker group Star Blizzard. The campaign began in October 2023 and continued through August 2024. Following extensive analysis, Microsoft’s experts revealed…

Supreme Court Rules TikTok Can Be Banned in US

Ruling from Supreme Court upholds nationwide ban on TikTok unless ByteDance sells, but official says Biden won’t enforce it This article has been indexed from Silicon UK Read the original article: Supreme Court Rules TikTok Can Be Banned in US

Mad at Meta? Don’t Let Them Collect and Monetize Your Personal Data

< div class=”field field–name-body field–type-text-with-summary field–label-hidden”> < div class=”field__items”> < div class=”field__item even”> If you’re fed up with Meta right now, you’re not alone. Google searches for deleting Facebook and Instagram spiked last week after Meta announced its latest policy…

Tarbomb Denial of Service via Path Traversal

As software applications are built and developed over the years, engineering teams continuously shift perspective on what features to prioritize or de-prioritize. A feature developed five years ago may have no significance today. However, features deemed low priority may still…

Global Apps Exploited to Harvest Sensitive Location Data

  Rogue actors within the advertising industry are reportedly exploiting major global apps to collect sensitive user location data on a massive scale. This data is then funneled to a location data firm whose subsidiary has previously sold global tracking…

Malicious GitHub PoC Exploit Spreads Infostealer Malware

  A malicious GitHub repository disguises a proof-of-concept (PoC) exploit for CVE-2024-49113, also known as “LDAPNightmare,” delivering infostealer malware that sends sensitive data to an external FTP server. Disguised as a legitimate PoC, the exploit tricks users into executing malware.…

How Russian hackers went after NGOs’ WhatsApp accounts

Star Blizzard, a threat actor tied to the Russian Federal Security Service (FSB), was spotted attempting to compromise targets’ WhatsApp accounts through a clever phishing campaign. The campaign The campaign started with a spear-phishing email that was made to look…

Lazarus Group Targets Developers in New Data Theft Campaign

SecurityScorecard identified a new campaign in which the North Korean Lazarus group aims to steal source code, secrets and cryptocurrency wallet keys from developer environments This article has been indexed from www.infosecurity-magazine.com Read the original article: Lazarus Group Targets Developers…