• Hackers Could Have Remotely Controlled Kia Cars Using Only License Plates

    Hackers Could Have Remotely Controlled Kia Cars Using Only License Plates

    Cybersecurity researchers have disclosed a set of now patched vulnerabilities in Kia vehicles that, if successfully exploited, could have allowed remote control over key functions simply by using only a license plate. “These attacks could be executed remotely on any hardware-equipped vehicle in about 30 seconds, regardless of whether it had an active Kia Connect…

    Read More

  • Google’s Shift to Rust Programming Cuts Android Memory Vulnerabilities by 52%

    Google’s Shift to Rust Programming Cuts Android Memory Vulnerabilities by 52%

    Google has revealed that its transition to memory-safe languages such as Rust as part of its secure-by-design approach has led to the percentage of memory-safe vulnerabilities discovered in Android dropping from 76% to 24% over a period of six years. The tech giant said focusing on Safe Coding for new features not only reduces the…

    Read More

  • Mozilla Faces Privacy Complaint for Enabling Tracking in Firefox Without User Consent

    Mozilla Faces Privacy Complaint for Enabling Tracking in Firefox Without User Consent

    Vienna-based privacy non-profit noyb (short for None Of Your Business) has filed a complaint with the Austrian data protection authority (DPA) against Firefox maker Mozilla for enabling a new feature called Privacy Preserving Attribution (PPA) without explicitly seeking users’ consent. “Contrary to its reassuring name, this technology allows Firefox to track user behavior on websites,”…

    Read More

  • Cybersecurity Researchers Warn of New Rust-Based Splinter Post-Exploitation Tool

    Cybersecurity Researchers Warn of New Rust-Based Splinter Post-Exploitation Tool

    Cybersecurity researchers have flagged the discovery of a new post-exploitation red team tool called Splinter in the wild. Palo Alto Networks Unit 42 shared its findings after it discovered the program on several customers’ systems. “It has a standard set of features commonly found in penetration testing tools and its developer created it using the…

    Read More

  • ChatGPT macOS Flaw Could’ve Enabled Long-Term Spyware via Memory Function

    ChatGPT macOS Flaw Could’ve Enabled Long-Term Spyware via Memory Function

    A now-patched security vulnerability in OpenAI’s ChatGPT app for macOS could have made it possible for attackers to plant long-term persistent spyware into the artificial intelligence (AI) tool’s memory. The technique, dubbed SpAIware, could be abused to facilitate “continuous data exfiltration of any information the user typed or responses received by ChatGPT, including any future…

    Read More

  • Expert Tips on How to Spot a Phishing Link

    Expert Tips on How to Spot a Phishing Link

    Phishing attacks are becoming more advanced and harder to detect, but there are still telltale signs that can help you spot them before it’s too late. See these key indicators that security experts use to identify phishing links:1. Check Suspicious URLs  Phishing URLs are often long, confusing, or filled with random characters. Attackers use these…

    Read More

  • Nov. 5 General Election: Candidates appearing on HR, Wasco co. ballots

    Nov. 5 General Election: Candidates appearing on HR, Wasco co. ballots

    THE GORGE — Local ballots for the Nov. 5 General Election will be mailed to registered voters Wednesday, Oct. 16. Below is a listing of candidates and measures appearing on Hood River and Wasco county ballots. For a listing of…

    Read More

  • Nov. 5 General Election: Candidates appearing on Klickitat, Skamania co. ballots

    Nov. 5 General Election: Candidates appearing on Klickitat, Skamania co. ballots

    THE GORGE — Ballots in Washington State will be mailed out Oct. 18, the start of the 18-day voting period, which runs through Nov. 5, Election Day.

    Read More

  • New PondRAT Malware Hidden in Python Packages Targets Software Developers

    New PondRAT Malware Hidden in Python Packages Targets Software Developers

    Threat actors with ties to North Korea have been observed using poisoned Python packages as a way to deliver a new malware called PondRAT as part of an ongoing campaign. PondRAT, according to new findings from Palo Alto Networks Unit 42, is assessed to be a lighter version of POOLRAT (aka SIMPLESEA), a known macOS…

    Read More

  • Chinese Hackers Exploit GeoServer Flaw to Target APAC Nations with EAGLEDOOR Malware

    Chinese Hackers Exploit GeoServer Flaw to Target APAC Nations with EAGLEDOOR Malware

    A suspected advanced persistent threat (APT) originating from China targeted a government organization in Taiwan, and possibly other countries in the Asia-Pacific (APAC) region, by exploiting a recently patched critical security flaw impacting OSGeo GeoServer GeoTools. The intrusion activity, which was detected by Trend Micro in July 2024, has been attributed to a threat actor…

    Read More