In US Senate testimony, a CrowdStrike exec explained how this advanced persistent threat penetrated telcos in Asia and Africa, gathering SMS messages, unique identifiers, and other metadata along the way.
Автор: Nate Nelson, Contributing Writer
‘CrossBarking’ Attack Targets Secret APIs, Exposes Opera Browser Users
Using a malicious Chrome extension, researchers showed how an attacker could use a now-fixed bug to inject custom code into a victim’s Opera browser to exploit special and powerful APIs, used by developers and typically saved for only the most trusted …
Mozilla: ChatGPT Can Be Manipulated Using Hex Code
LLMs tend to miss the forest for the trees, understanding specific instructions but not their broader context. Bad actors can take advantage of this myopia to get them to do malicious things, with a new prompt-injection technique.
Russia’s APT29 Mimics AWS Domains to Steal Windows Credentials
Kremlin intelligence carried out a wide-scale phishing campaign in contrast to its usual, more targeted operations.
Critical Bug Exploited in Fortinet’s Management Console
An attacker compromised one of Fortinet’s most sensitive products and mopped up all kinds of reconnaissance data helpful for future mass device attacks.
‘Prometei’ Botnet Spreads Its Cryptojacker Worldwide
The Russian-language malware primarily enlists computers to mine Monero, but theoretically it can do worse.
MacOS Safari ‘HM Surf’ Exploit Exposes Camera, Mic, Browser Data
Microsoft researchers toyed with app permissions to uncover CVE-2024-44133, using it to access sensitive user data. Adware merchants may have as well.
Anonymous Sudan Unmasked as Leaders Face Life in Prison
US officials disrupted the group’s DDoS operation and arrested two individuals behind it, who turned out to be far less intimidating than they were made out to be in the media.
Iran’s APT34 Abuses MS Exchange to Spy on Gulf Gov’ts
A MOIS-aligned threat group has been using Microsoft Exchange servers to exfiltrate sensitive data from Gulf-state government agencies.
SOC Teams: Threat Detection Tools Are Stifling Us
Threat detection tools yield too many false positives, security pros say, leading to burnout and resentment.