Recent Security News

  • VMware urges admins to remove deprecated, vulnerable auth plug-in

    February 20, 2024 at 04:05PM VMware warns administrators to remove a deprecated authentication plugin due to security vulnerabilities, enabling attackers to hijack privileged sessions and relay Kerberos tickets. To address the flaws, uninstall the plugin and stop its associated Windows service using PowerShell commands. The company stated there is no evidence of exploitation, and advises…

    Read More

  • VoltSchemer attacks use wireless chargers to inject voice commands, fry phones

    February 20, 2024 at 04:05PM Researchers at the University of Florida and CertiK discovered the VoltSchemer attacks, which exploit electromagnetic interference to manipulate wireless charging systems. These attacks can cause smartphones to overheat, damage nearby electronic items, and inject voice commands into device assistants. Security gaps were identified and discussions with charging station vendors took…

    Read More

  • Google’s Cloud Run Service Spreads Several Bank Trojans

    February 20, 2024 at 03:54PM Researchers have identified a concerning increase in the spread of banking malware through abusive use of Google Cloud Run Service. Campaigns have expanded beyond Latin America, with Cisco Talos noting an uptick in such attacks since September 2023. Malicious emails with links to threat-controlled Cloud Run Web services are used…

    Read More

  • Median Ransomware Demands Grow to $600K a Pop

    February 20, 2024 at 03:17PM Ransomware attacks in 2023 saw a 20% increase in median initial ransom demands, reaching $600,000. Sectors such as legal, government, retail, and energy are seeing median demands of $1 million or more. LockBit, BlackCat/ALPHV, and Cl0p were the primary groups carrying out attacks, with LockBit dominating the market. Key takeaways…

    Read More

  • New Migo malware disables protection features on Redis servers

    February 20, 2024 at 02:44PM Researchers discovered a new malware campaign targeting Linux-based Redis servers, using a piece of malware called ‘Migo’ to mine for cryptocurrency. Migo disables key security features of Redis, allowing attackers to run cryptojacking activities. It also establishes persistence for a Monero miner, uses a rootkit for concealment, and manipulates system…

    Read More