Skip to content

Polymath Central

Thoughts and musings of David Greenberg, a polymath

Cybersecurity

TikTok Pixel Privacy Nightmare: A New Case Study

November 14, 2024

Advertising on TikTok is the obvious choice for any company trying to reach a young market, and especially so if it happens to be a travel company, with 44% of…

Cybersecurity

New RustyAttr Malware Targets macOS Through Extended Attribute Abuse

November 14, 2024

Threat actors have been found leveraging a new technique that abuses extended attributes for macOS files to smuggle a new malware called RustyAttr. The Singaporean cybersecurity company has attributed the…

Cybersecurity

Russian Hackers Exploit New NTLM Flaw to Deploy RAT Malware via Phishing Emails

November 14, 2024

A newly patched security flaw impacting Windows NT LAN Manager (NTLM) was exploited as a zero-day by a suspected Russia-linked actor as part of cyber attacks targeting Ukraine. The vulnerability…

Cybersecurity

Hamas-Affiliated WIRTE Employs SameCoin Wiper in Disruptive Attacks Against Israel

November 13, 2024

A threat actor affiliated with Hamas has expanded its malicious cyber operations beyond espionage to carry out disruptive attacks that exclusively target Israeli entities. The activity, linked to a group…

Cybersecurity

Free Decryptor Released for BitLocker-Based ShrinkLocker Ransomware Victims

November 13, 2024

Romanian cybersecurity company Bitdefender has released a free decryptor to help victims recover data encrypted using the ShrinkLocker ransomware. The decryptor is the result of a comprehensive analysis of ShrinkLocker’s…

Cybersecurity

Comprehensive Guide to Building a Strong Browser Security Program

November 13, 2024

The rise of SaaS and cloud-based work environments has fundamentally altered the cyber risk landscape. With more than 90% of organizational network traffic flowing through browsers and web applications, companies…

Cybersecurity

OvrC Platform Vulnerabilities Expose IoT Devices to Remote Attacks and Code Execution

November 13, 2024

A security analysis of the OvrC cloud platform has uncovered 10 vulnerabilities that could be chained to allow potential attackers to execute code remotely on connected devices. “Attackers successfully exploiting…

Cybersecurity

Microsoft Fixes 90 New Flaws, Including Actively Exploited NTLM and Task Scheduler Bugs

November 13, 2024

Microsoft on Tuesday revealed that two security flaws impacting Windows NT LAN Manager (NTLM) and Task Scheduler have come under active exploitation in the wild. The security vulnerabilities are among…

Cybersecurity

Iranian Hackers Use “Dream Job” Lures to Deploy SnailResin Malware in Aerospace Attacks

November 13, 2024

The Iranian threat actor known as TA455 has been observed taking a leaf out of a North Korean hacking group’s playbook to orchestrate its own version of the Dream Job…

Cybersecurity

New Phishing Tool GoIssue Targets GitHub Developers in Bulk Email Campaigns

November 12, 2024

Cybersecurity researchers are calling attention to a new sophisticated tool called GoIssue that can be used to send phishing messages at scale targeting GitHub users. The program, first marketed by…

Posts pagination

1 … 125 126 127

Polymath Central

Thoughts and musings of David Greenberg, a polymath

Proudly powered by WordPress | Theme: Newsup by Themeansar.