Google Warns of Rising Cloaking Scams, AI-Driven Fraud, and Crypto Schemes

November 14, 2024 at 09:58AM Google has reported increasing scams where fraudsters use landing page cloaking to impersonate legitimate sites, manipulating users into purchasing counterfeit products. Techniques include AI-generated deepfakes and cloning legitimate apps. Google has taken action by blocking billions of scam ads and enhancing user protection through new detection features in Android apps. … Read more

THN Recap: Top Cybersecurity Threats, Tools, and Practices (Nov 04 – Nov 10)

November 11, 2024 at 07:30AM In 2024, hackers exploit trusted cybersecurity tools, posing significant threats to banks and critical systems. A major FBI investigation targets China-linked cyberattacks using custom malware. New vulnerabilities and malware, including ToxicPanda and VEILDrive, are emerging, highlighting the need for urgent updates and enhanced security measures to safeguard against sophisticated threats. … Read more

‘SteelFox’ Miner and Information Stealer Bundle Emerges

November 7, 2024 at 07:59AM The SteelFox crimeware bundle masquerades as legitimate software like Foxit PDF Editor and AutoCAD to steal user information. This emerging threat poses significant risks to users seeking these applications. The information was reported by SecurityWeek. **Meeting Takeaways:** 1. **Threat Overview**: The SteelFox crimeware bundle impersonates legitimate software, specifically Foxit PDF … Read more

Fake Copyright Infringement Emails Spread Rhadamanthys

November 6, 2024 at 05:56PM Check Point Research has tracked a spear-phishing campaign, “CopyR(ight)hadamantys,” targeting hundreds of companies globally with emails claiming copyright infringement. The emails deliver the sophisticated infostealer Rhadamanthys, capable of stealing sensitive data. Attackers use automation to send these messages, often impersonating known brands in technology and entertainment industries. ### Key Takeaways … Read more

Businesses Worldwide Targeted in Large-Scale ChatGPT Phishing Campaign

November 4, 2024 at 04:01AM Barracuda has identified a widespread phishing campaign impersonating OpenAI, aiming to steal ChatGPT credentials from businesses globally. This large-scale effort poses significant security risks as it targets various organizations. **Meeting Takeaways:** 1. **Observation of Campaign**: Barracuda has identified a significant impersonation campaign targeting OpenAI. 2. **Objective of the Campaign**: The … Read more

LottieFiles hacked in supply chain attack to steal users’ crypto

October 31, 2024 at 04:10PM LottieFiles’ Lotti-Player project was compromised in a supply chain attack, injecting a crypto drainer into websites, potentially costing one victim $723,000 in Bitcoin. Affected versions were quickly replaced with a secure update. Users are advised to upgrade or be cautious of fraudulent wallet connection requests amid ongoing investigations into the … Read more

Recent Version of LightSpy iOS Malware Packs Destructive Capabilities

October 30, 2024 at 07:05AM A recent update of the LightSpy malware for iOS introduces more than a dozen new plugins, some featuring destructive capabilities. This development raises concerns about the malware’s potential impact on device security. **Meeting Takeaways:** 1. **Update on LightSpy Malware**: A newer version of the LightSpy malware specifically designed for iOS … Read more

US, Australia Release New Security Guide for Software Makers

October 25, 2024 at 08:46AM CISA, FBI, and ACSC have released guidance aimed at assisting software manufacturers in creating secure deployment processes. This new security guide aims to strengthen the safety and reliability of software applications. The information was shared in a report by SecurityWeek. **Meeting Takeaways:** 1. **Publication of Guidance**: CISA (Cybersecurity and Infrastructure … Read more

About the security content of AirPods Firmware Update 6A326, AirPods Firmware Update 6F8, and Beats Firmware Update 6F8 – Apple Support

October 15, 2024 at 02:09PM An authentication vulnerability (CVE-2024-27867) in certain AirPods and Beats models allows attackers within Bluetooth range to spoof connections to headphones. A firmware update addressing this issue is available for AirPods (2nd generation and later), AirPods Pro, AirPods Max, Powerbeats Pro, and Beats Fit Pro, effective June 25, 2024. ### Meeting … Read more

About the security content of tvOS 17.6 – Apple Support

October 15, 2024 at 01:51PM Apple released a security update for tvOS 17.6 on July 29, 2024, addressing several vulnerabilities (CVE-2024-40774, 40799, 40815, etc.) that could allow apps to bypass privacy settings, cause app terminations, reveal kernel memory layout, or enable cross-site scripting attacks. Update is available for Apple TV HD and 4K models. ### … Read more