The Pakistani APT36 cyberspies are using Linux .desktop files to load malware in new attacks against government and defense entities in India. The activity, documented in reports by CYFIRMA and CloudSEK, aims at data exfiltration and persistent espionage access. APT 36 has previously used .desktop files to load malware in targeted espionage operations in South Asia. The attacks were first …
Read More »Tag Archives: Hackers
Hackers Can Use The Flipper Zero To Unlock Cars, But The Device Itself Isn’t The Problem
Amber DaSilva / Jalopnik The Flipper Zero is mired in controversy again. The electronic multitool, with its array of various antennas, has long been demonized for simply existing — the Canadian government has even talked about banning it entirely due to a theorized but then-unproven link to car thefts. Now, an investigation …
Read More »Major flaw in top password managers lets hackers steal your login details, 2FA codes, credit card info and more
Several of the best password managers have been found to be vulnerable to a flaw that lets hackers pull off clickjacking attacks. Researcher Marek Tóth recently demonstrated how the bug allows attackers to overlay invisible HTML elements over an interface so that users think they’re clicking on a standard popup but instead, they’re actually unknowingly leaking sensitive information like account …
Read More »Workday says hackers used social engineering to access personal data during a breach
Human resources technology company Workday has confirmed that a data breach has affected its third-party CRM platform. In a announcing the breach, the company said that a social engineering campaign had targeted its employees, with threat actors posing as IT or HR in order to trick employees into sharing account access or personal information. The company says that while the …
Read More »HR giant Workday says hackers stole personal data in recent breach
Workday, one of the largest providers of human resources technology, has confirmed a data breach that allowed hackers to steal personal information from one of its third-party customer relationship databases. In a blog post published late Friday, the HR technology giant said the hackers stole an unspecified amount of personal information from the database, which Workday said was primarily used …
Read More »Hackers Mimic IT Teams to Exploit Microsoft Teams Request to Gain System Remote Access
A sophisticated social engineering campaign by the EncryptHub threat group that combines impersonation tactics with technical exploitation to compromise corporate networks. The Russian-linked cybercriminals are posing as IT support staff and using Microsoft Teams requests to establish remote access, ultimately deploying malicious payloads through a previously unknown Windows vulnerability. The attack begins with threat actors claiming to be from internal …
Read More »Hackers Went Looking for a Backdoor in High-Security Safes—and Now Can Open Them in Seconds
Zhou added in his statement that Securam will be fixing the vulnerabilities Omo and Rowley found in future models of the ProLogic lock. “Customer security is our priority and we have begun the process of creating next-generation products to thwart these potential attacks,” he writes. “We expect to have new locks on the market by the end of the year.” …
Read More »Hackers Hijacked Google’s Gemini AI With a Poisoned Calendar Invite to Take Over a Smart Home
Within the titles of the calendar invites, the researchers added their crafty malicious prompts. (Google’s Wen contends that the researchers changed default settings on who can add calendar invites to someone’s calendar; however, the researchers say they demonstrated some of the 14 attacks with the prompts in an email subject or document title as well). “All the techniques are just …
Read More »ReVault flaws let hackers bypass Windows login on Dell laptops
ControlVault3 firmware vulnerabilities impacting over 100 Dell laptop models can allow attackers to bypass Windows login and install malware that persists across system reinstalls. Dell ControlVault is a hardware-based security solution that stores passwords, biometric data, and security codes within firmware on a dedicated daughterboard, known as the Unified Security Hub (USH). The five vulnerabilities, reported by Cisco’s Talos security division and …
Read More »Cloudflare: Perplexity AI Acts Like North Korean Hackers, Ignores Scraping Blocks – PCMag UK
Cloudflare: Perplexity AI Acts Like North Korean Hackers, Ignores Scraping Blocks PCMag UK Perplexity is using stealth, undeclared crawlers to evade website no-crawl directives The Cloudflare Blog Some people are defending Perplexity after Cloudflare ‘named and shamed’ it Yahoo Finance AI company Perplexity is sneaking to get around blocks on crawlers, Cloudflare alleges CyberScoop An AI Data Trap Catches Perplexity Impersonating Google Business Insider Source …
Read More »