• 8 Tips for Safeguarding Your Gadgets While Traveling

    8 Tips for Safeguarding Your Gadgets While Traveling

    Traveling with technology has become a necessity. Whether for work, communication, or entertainment, we rely heavily on our devices. But traveling exposes these gadgets to various risks. Theft, damage, and loss are common concerns.  We’ve put together some helpful tips to mitigate the risk of any tech mishaps on your next trip. Follow these eight…

  • Ivanti Warns of Active Exploitation of Newly Patched Cloud Appliance Vulnerability

    Ivanti Warns of Active Exploitation of Newly Patched Cloud Appliance Vulnerability

    Ivanti has revealed that a newly patched security flaw in its Cloud Service Appliance (CSA) has come under active exploitation in the wild. The high-severity vulnerability in question is CVE-2024-8190 (CVSS score: 7.2), which allows remote code execution under certain circumstances. “An OS command injection vulnerability in Ivanti Cloud Services Appliance versions 4.6 Patch 518…

  • Wasco County Democratic Central Committee announces grand opening celebration

    Wasco County Democratic Central Committee announces grand opening celebration

    THE DALLES — On Sept. 14 from noon to 4 p.m., join the Wasco County Democrats and Friends to celebrate the grand opening of the new office location in the Gayer building at 300 Washington St.

  • Apple Vision Pro Vulnerability Exposed Virtual Keyboard Inputs to Attackers

    Apple Vision Pro Vulnerability Exposed Virtual Keyboard Inputs to Attackers

    Details have emerged about a now-patched security flaw impacting Apple’s Vision Pro mixed reality headset that, if successfully exploited, could allow malicious attackers to infer data entered on the device’s virtual keyboard. The attack, dubbed GAZEploit, has been assigned the CVE identifier CVE-2024-40865. “A novel attack that can infer eye-related biometrics from the avatar image…

  • 17-Year-Old Arrested in Connection with Cyber Attack Affecting Transport for London

    17-Year-Old Arrested in Connection with Cyber Attack Affecting Transport for London

    British authorities on Thursday announced the arrest of a 17-year-old male in connection with a cyber attack affecting Transport for London (TfL). “The 17-year-old male was detained on suspicion of Computer Misuse Act offenses in relation to the attack, which was launched on TfL on 1 September,” the U.K. National Crime Agency (NCA) said. The…

  • Say Goodbye to Phishing: Must-Haves to Eliminate Credential Theft

    Say Goodbye to Phishing: Must-Haves to Eliminate Credential Theft

    Even as cyber threats become increasingly sophisticated, the number one attack vector for unauthorized access remains phished credentials (Verizon DBIR, 2024). Solving this problem resolves over 80% of your corporate risk, and a solution is possible.  However, most tools available on the market today cannot offer a complete defense against this attack vector because they…

  • TrickMo Android Trojan Exploits Accessibility Services for On-Device Banking Fraud

    TrickMo Android Trojan Exploits Accessibility Services for On-Device Banking Fraud

    Cybersecurity researchers have uncovered a new variant of an Android banking trojan called TrickMo that comes packed with new capabilities to evade analysis and display fake login screens to capture victims’ banking credentials. “The mechanisms include using malformed ZIP files in combination with JSONPacker,” Cleafy security researchers Michele Roviello and Alessandro Strino said. “In addition,

  • Progress WhatsUp Gold Exploited Just Hours After PoC Release for Critical Flaw

    Progress WhatsUp Gold Exploited Just Hours After PoC Release for Critical Flaw

    Malicious actors are likely leveraging publicly available proof-of-concept (PoC) exploits for recently disclosed security flaws in Progress Software WhatsUp Gold to conduct opportunistic attacks. The activity is said to have commenced on August 30, 2024, a mere five hours after a PoC was released for CVE-2024-6670 (CVSS score: 9.8) by security researcher Sina Kheirkhah of…

  • New Android Malware ‘Ajina.Banker’ Steals Financial Data and Bypasses 2FA via Telegram

    New Android Malware ‘Ajina.Banker’ Steals Financial Data and Bypasses 2FA via Telegram

    Bank customers in the Central Asia region have been targeted by a new strain of Android malware codenamed Ajina.Banker since at least November 2024 with the goal of harvesting financial information and intercepting two-factor authentication (2FA) messages. Singapore-headquartered Group-IB, which discovered the threat in May 2024, said the malware is propagated via a network of…

  • Urgent: GitLab Patches Critical Flaw Allowing Unauthorized Pipeline Job Execution

    Urgent: GitLab Patches Critical Flaw Allowing Unauthorized Pipeline Job Execution

    GitLab on Wednesday released security updates to address 17 security vulnerabilities, including a critical flaw that allows an attacker to run pipeline jobs as an arbitrary user. The issue, tracked as CVE-2024-6678, carries a CVSS score of 9.9 out of a maximum of 10.0 “An issue was discovered in GitLab CE/EE affecting all versions starting…

  • Beware: New Vo1d Malware Infects 1.3 Million Android TV Boxes Worldwide

    Beware: New Vo1d Malware Infects 1.3 Million Android TV Boxes Worldwide

    Nearly 1.3 million Android-based TV boxes running outdated versions of the operating system and belonging to users spanning 197 countries have been infected by a new malware dubbed Vo1d (aka Void). “It is a backdoor that puts its components in the system storage area and, when commanded by attackers, is capable of secretly downloading and…

  • Exposed Selenium Grid Servers Targeted for Crypto Mining and Proxyjacking

    Exposed Selenium Grid Servers Targeted for Crypto Mining and Proxyjacking

    Internet-exposed Selenium Grid instances are being targeted by bad actors for illicit cryptocurrency mining and proxyjacking campaigns. “Selenium Grid is a server that facilitates running test cases in parallel across different browsers and versions,” Cado Security researchers Tara Gould and Nate Bill said in an analysis published today. “However, Selenium Grid’s default configuration lacks