• Researchers Uncover 10 Flaws in Google’s File Transfer Tool Quick Share

    Researchers Uncover 10 Flaws in Google’s File Transfer Tool Quick Share

    As many as 10 security flaws have been uncovered in Google’s Quick Share data transfer utility for Android and Windows that could be assembled to trigger remote code execution (RCE) chain on systems that have the software installed. “The Quick Share application implements its own specific application-layer communication protocol to support file transfers between nearby,…

    Read More

  • New Malware Hits 300,000 Users with Rogue Chrome and Edge Extensions

    New Malware Hits 300,000 Users with Rogue Chrome and Edge Extensions

    An ongoing, widespread malware campaign has been observed installing rogue Google Chrome and Microsoft Edge extensions via a trojan distributed via fake websites masquerading as popular software. “The trojan malware contains different deliverables ranging from simple adware extensions that hijack searches to more sophisticated malicious scripts that deliver local extensions to steal private data

    Read More

  • Microsoft Warns of Unpatched Office Vulnerability Leading to Data Exposure

    Microsoft Warns of Unpatched Office Vulnerability Leading to Data Exposure

    Microsoft has disclosed an unpatched zero-day in Office that, if successfully exploited, could result in unauthorized disclosure of sensitive information to malicious actors. The vulnerability, tracked as CVE-2024-38200 (CVSS score: 7.5), has been described as a spoofing flaw that affects the following versions of Office – Microsoft Office 2016 for 32-bit edition and 64-bit editions…

    Read More

  • Experts Uncover Severe AWS Flaws Leading to RCE, Data Theft, and Full-Service Takeovers

    Experts Uncover Severe AWS Flaws Leading to RCE, Data Theft, and Full-Service Takeovers

    Cybersecurity researchers have discovered multiple critical flaws in Amazon Web Services (AWS) offerings that, if successfully exploited, could result in serious consequences. “The impact of these vulnerabilities range between remote code execution (RCE), full-service user takeover (which might provide powerful administrative access), manipulation of AI modules, exposing sensitive data, data

    Read More

  • Microsoft Reveals Four OpenVPN Flaws Leading to Potential RCE and LPE

    Microsoft Reveals Four OpenVPN Flaws Leading to Potential RCE and LPE

    Microsoft on Thursday disclosed four medium-severity security flaws in the open-source OpenVPN software that could be chained to achieve remote code execution (RCE) and local privilege escalation (LPE). “This attack chain could enable attackers to gain full control over targeted endpoints, potentially resulting in data breaches, system compromise, and unauthorized access to sensitive information

    Read More

  • New Flaws in Sonos Smart Speakers Allow Hackers to Eavesdrop on Users

    New Flaws in Sonos Smart Speakers Allow Hackers to Eavesdrop on Users

    Cybersecurity researchers have uncovered weaknesses in Sonos smart speakers that could be exploited by malicious actors to clandestinely eavesdrop on users. The vulnerabilities “led to an entire break in the security of Sonos’s secure boot process across a wide range of devices and remotely being able to compromise several devices over the air,” NCC Group…

    Read More

  • DOJ Charges Nashville Man for Helping North Koreans Get U.S. Tech Jobs

    DOJ Charges Nashville Man for Helping North Koreans Get U.S. Tech Jobs

    The U.S. Department of Justice (DoJ) on Thursday charged a 38-year-old individual from Nashville, Tennessee, for allegedly running a “laptop farm” to help get North Koreans remote jobs with American and British companies. Matthew Isaac Knoot is charged with conspiracy to cause damage to protected computers, conspiracy to launder monetary instruments, conspiracy to commit wire…

    Read More

  • CISA Warns of Hackers Exploiting Legacy Cisco Smart Install Feature

    CISA Warns of Hackers Exploiting Legacy Cisco Smart Install Feature

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has disclosed that threat actors are abusing the legacy Cisco Smart Install (SMI) feature with the aim of accessing sensitive data. The agency said it has seen adversaries “acquire system configuration files by leveraging available protocols or software on devices, such as abusing the legacy Cisco Smart…

    Read More

  • University Professors Targeted by North Korean Cyber Espionage Group

    University Professors Targeted by North Korean Cyber Espionage Group

    The North Korea-linked threat actor known as Kimsuky has been linked to a new set of attacks targeting university staff, researchers, and professors for intelligence gathering purposes. Cybersecurity firm Resilience said it identified the activity in late July 2024 after it observed an operation security (OPSEC) error made by the hackers. Kimsuky, also known by…

    Read More

  • 0.0.0.0 Day: 18-Year-Old Browser Vulnerability Impacts MacOS and Linux Devices

    0.0.0.0 Day: 18-Year-Old Browser Vulnerability Impacts MacOS and Linux Devices

    Cybersecurity researchers have discovered a new “0.0.0.0 Day” impacting all major web browsers that malicious websites could take advantage of to breach local networks. The critical vulnerability “exposes a fundamental flaw in how browsers handle network requests, potentially granting malicious actors access to sensitive services running on local devices,” Oligo Security researcher Avi Lumelsky

    Read More