Category: Uncategorized
-
Android Trojan Crocodilus Now Active in 8 Countries, Targeting Banks and Crypto Wallets [email protected] (The Hacker News)
A growing number of malicious campaigns have leveraged a recently discovered Android banking trojan called Crocodilus to target users in Europe and South America. The malware, according to a new report published by ThreatFabric, has also adopted improved obfuscation techniques to hinder analysis and detection, and includes the ability to create new contacts in the…
-
Google Chrome to Distrust Two Certificate Authorities Over Compliance and Conduct Issues [email protected] (The Hacker News)
Google has revealed that it will no longer trust digital certificates issued by Chunghwa Telecom and Netlock citing “patterns of concerning behavior observed over the past year.” The changes are expected to be introduced in Chrome 139, which is scheduled for public release in early August 2025. The current major version is 137. The update…
-
Microsoft and CrowdStrike Launch Shared Threat Actor Glossary to Cut Attribution Confusion [email protected] (The Hacker News)
Microsoft and CrowdStrike have announced that they are teaming up to align their individual threat actor taxonomies by publishing a new joint threat actor mapping. “By mapping where our knowledge of these actors align, we will provide security professionals with the ability to connect insights faster and make decisions with greater confidence,” Vasu Jakkal, corporate…
-
New Chrome Zero-Day Actively Exploited; Google Issues Emergency Out-of-Band Patch [email protected] (The Hacker News)
Google on Monday released out-of-band fixes to address three security issues in its Chrome browser, including one that it said has come under active exploitation in the wild. The high-severity flaw is being tracked as CVE-2025-5419, and has been flagged as an out-of-bounds read and write vulnerability in the V8 JavaScript and WebAssembly engine. “Out…
-
New Chrome Zero-Day Actively Exploited; Google Issues Emergency Out-of-Band Patch [email protected] (The Hacker News)
Google on Monday released out-of-band fixes to address three security issues in its Chrome browser, including one that it said has come under active exploitation in the wild. The high-severity flaw is being tracked as CVE-2025-5419, and has been flagged as an out-of-bounds read and write vulnerability in the V8 JavaScript and WebAssembly engine. “Out…
-
Cryptojacking Campaign Exploits DevOps APIs Using Off-the-Shelf Tools from GitHub [email protected] (The Hacker News)
Cybersecurity researchers have discovered a new cryptojacking campaign that’s targeting publicly accessible DevOps web servers such as those associated with Docker, Gitea, and HashiCorp Consul and Nomad to illicitly mine cryptocurrencies. Cloud security firm Wiz, which is tracking the activity under the name JINX-0132, said the attackers are exploiting a wide range of known misconfigurations…
-
Preinstalled Apps on Ulefone, Krüger&Matz Phones Let Any App Reset Device, Steal PIN [email protected] (The Hacker News)
Three security vulnerabilities have been disclosed in preloaded Android applications on smartphones from Ulefone and Krüger&Matz that could enable any app installed on the device to perform a factory reset and encrypt an application. A brief description of the three flaws is as follows – CVE-2024-13915 (CVSS score: 6.9) – A pre-installed “com.pri.factorytest” application on…
-
Qualcomm Fixes 3 Zero-Days Used in Targeted Android Attacks via Adreno GPU [email protected] (The Hacker News)
Qualcomm has shipped security updates to address three zero-day vulnerabilities that it said have been exploited in limited, targeted attacks in the wild. The flaws in question, which were responsibly disclosed to the company by the Google Android Security team, are listed below – CVE-2025-21479 and CVE-2025-21480 (CVSS score: 8.6) – Two incorrect authorization vulnerabilities…
-
The DOGE effect on cybersecurity: Efficiency vs. risk
The DOGE effect on security is a complex issue. Pursuit of efficiency might be a legitimate goal, but experts caution it can conflict with cybersecurity defenses.Read More
-
The DOGE effect on cyber: What’s happened and what’s next?
In this webinar, part of ‘CISO Insights’ series, cybersecurity experts debate the pros and cons of the Department of Government Efficiency’s actions and the impact on their field.Read More