22 Nov, 2024

NSO Group used another WhatsApp zero-day after being sued, court docs say

Israeli surveillance firm NSO Group reportedly used multiple zero-day exploits, including an unknown one named “Erised,” that leveraged WhatsApp vulnerabilities to deploy Pegasus spyware in zero-click attacks, even after getting sued. Pegasus is NSO Group’s spyware platform (marketed as surveillance software for governments worldwide), with multiple software components that provide customers with extensive surveillance capabilities over […]

4 mins read

ChatGPT allows access to underlying sandbox OS, “playbook” data

OpenAI’s ChatGPT platform provides a great degree of access to the LLM’s sandbox, allowing you to upload programs and files, execute commands, and browse the sandbox’s file structure. The ChatGPT sandbox is an isolated environment that allows users to interact with the it securely while being walled off from other users and the host servers. […]

5 mins read

Hackers use macOS extended file attributes to hide malicious code

Hackers are using a novel technique that abuses extended attributes for macOS files to deliver a new trojan that researchers call RustyAttr. The threat actor is hiding malicious code in custom file metadata and also uses decoy PDF documents to help evade detection. The new technique is similar to how the Bundlore adware in 2020 hid its […]

3 mins read

Stalker 2: Heart of Chornobyl – Everything We Know So Far

It feels surreal to finally say this, but Stalker 2: Heart of Chornobyl is finally about to launch. While Stalker fans have been itching to get back into The Zone since 2009’s Call Of Pripyat concluded the series’ original trilogy, Stalker 2 has been repeatedly pushed back due to Russia’s invasion of Ukraine. All of […]

18 mins read

North Korean hackers create Flutter apps to bypass macOS security

North Korean threat actors target Apple macOS systems using trojanized Notepad apps and minesweeper games created with Flutter, which are signed and notarized by a legitimate Apple developer ID. This means that the malicious apps, even if temporarily, passed Apple’s security checks, so macOS systems treat them as verified and allow them to execute without […]

3 mins read

iPhones now auto-restart to block access to encrypted data after long idle times

Apple has added a new security feature with the iOS 18.1 update released last month to ensure that iPhones automatically reboot after long idle periods to re-encrypt data and make it harder to extract. While the company has yet to officially confirm this new “inactivity reboot” feature, law enforcement officers were the first to discover […]

2 mins read

Microsoft investigates OneDrive issue causing macOS app freezes

​Microsoft is investigating a newly acknowledged issue causing macOS applications to hang when opening or saving files in OneDrive. As the company explained, this known issue impacts only systems running macOS Sequoia, Apple’s latest operating system release. “Opening or saving files within Desktop or Documents folders can cause the file’s app to freeze. This occurs […]

2 mins read

Unpatched Mazda Connect bugs let hackers install persistent malware

Attackers could exploit several vulnerabilities in the Mazda Connect infotainment unit, present in multiple car models including Mazda 3 (2014-2021), to execute arbitrary code with root permission. The security issues remain unpatched and some of them are command injection flaws that could be leveraged to obtain unrestricted access to vehicle networks, potentially impacting the car’s […]

3 mins read

Google’s mysterious ‘search.app’ links leave Android users concerned

Google has left Android users puzzled after the most recent update to the Google mobile app causes links shared from the app to now be prepended with a mysterious “search.app” domain. As the Google app is a popular portal for searching the web for Android users and delivers a personalized content news feed referred to […]

6 mins read

North Korean hackers use new macOS malware against crypto firms

North Korean threat actor BlueNoroff has been targeting crypto-related businesses with a new multi-stage malware for macOS systems. Researchers are calling the campaign Hidden Risk and say that it lures victims with emails that share fake news about the latest activity in the cryptocurrency sector. The malware deployed in these attacks relies on a novel […]

4 mins read