Security News

4115 readers
2 users here now

founded 2 years ago
MODERATORS
1
 
 

it's digital independence day! get your relatives off whatsapp

2
3
 
 

Threat actors with ties to the Democratic People's Republic of Korea (aka DPRK or North Korea) have been observed leveraging ClickFix-style lures to deliver a known malware called BeaverTail and InvisibleFerret.

4
5
6
 
 

This was sent to me but one of my tech illiterate friends. Thoughts on this? Seems sketchy af. The video on TikTok is like, "It's fun. Add your person." Being that it's all federal offense to dox the ice nazis, I'm feeling like this shit is a honeypot?

Edit:turns out the picture uploaded to my cache on my browser but not to the server so this post looked dumb and empty. Put the picture below in the comment thread.

7
 
 

Financially motivated by salaries now, but what’s next?

For now, North Korean technical workers are focused on attaining employment, doing those jobs, and sending the money they earn back to Pyongyang.

North Korean technical workers generate hundreds of millions of dollars for the North Korean regime, according to Unit 42.

8
9
10
 
 

Security researchers have discovered an arbitrary account takeover flaw in Subaru's Starlink service that could let attackers track, control, and hijack vehicles in the United States, Canada, and Japan using just a license plate.

Curry says Subaru patched the vulnerability within 24 hours of the researchers' report and was never exploited by an attacker.

11
 
 

A North Korean threat group has been using a technique called RID hijacking that tricks Windows into treating a low-privileged account as one with administrator permissions.

12
 
 

The CloudSEK researchers disrupted the botnet by utilizing hard-coded API tokens and a built-in kill switch to uninstall the malware from infected devices.

13
14
15
 
 

"Mac Homebrew Project Leader here. This seems taken down now," tweeted McQuaid.

16
 
 

To safeguard against such attacks, it's advised to monitor suspicious processes, events, and network traffic spawned by the execution of any untrusted binary/scripts. It's also recommended to apply firmware updates and change the default username and password.

17
18
 
 

A malicious package named 'pycord-self' on the Python package index (PyPI) targets Discord developers to steal authentication tokens and plant a backdoor for remote control over the system.

19
20
21
22
23
 
 

cross-posted from: https://lemmy.zip/post/30049292

Emergent macOS vulnerability lets adversaries circumvent Apple's System Integrity Protection (SIP) by loading third-party kernels.

24
 
 

New research has pulled back the curtain on a "deficiency" in Google's "Sign in with Google" authentication flow that exploits a quirk in domain ownership to gain access to sensitive data.

25
 
 

The ambitious final executive order requires 52 agency actions to bolster cyber protections and counter adversaries, including a new plan to address spiraling digital identity theft.

view more: next ›