Security News > 2024 > July

Europol says mobile roaming tech is making its job too hard
2024-07-05 08:26

Europol published a position paper today highlighting its concerns around SMS home routing - the technology that allows telcos to continue offering their services when customers visit another country. According to the cops, they pointed out that when roaming, a suspect in a criminal case who's using a SIM from another country will have all of their mobile communications processed through their home network.

Infostealing malware masquerading as generative AI tools
2024-07-05 05:00

Over the past six months, there has been a notable surge in Android financial threats - malware targeting victims' mobile banking funds, whether in the form of 'traditional' banking malware or, more recently, cryptostealers, according to ESET. Vidar infostealer targets Windows users. Infostealing malware can now be found impersonating generative AI tools, and new mobile malware GoldPickaxe is capable of stealing facial recognition data to create deepfake videos used by the malware's operators to authenticate fraudulent financial transactions.

99% of IoT exploitation attempts rely on previously known CVEs
2024-07-05 04:30

The explosion of Internet of Things devices has brought about a wide range of security and privacy challenges, according to Bitdefender and NETGEAR. The report is based on global telemetry of 3.8 million homes and 50 million IoT devices that generated 9.1 billion security events over the course of 12 months. Vulnerabilities in IoT frameworks, like those found in the ThroughTek Kalay platform, expose millions of users to potential privacy breaches.

Polyfill[.]io Attack Impacts Over 380,000 Hosts, Including Major Companies
2024-07-05 04:18

The supply chain attack targeting widely-used Polyfill[.]io JavaScript library is wider in scope than previously thought, with new findings from Censys showing that over 380,000 hosts are...

47% of corporate data stored in the cloud is sensitive
2024-07-05 04:00

As the use of the cloud continues to be strategically vital to many organizations, cloud resources have become the biggest targets for cyberattacks, with SaaS applications (31%), cloud storage...

New Golang-Based Zergeca Botnet Capable of Powerful DDoS Attacks
2024-07-05 03:52

Cybersecurity researchers have uncovered a new botnet called Zergeca that's capable of conducting distributed denial-of-service (DDoS) attacks. Written in Golang, the botnet is so named for its...

Organizations weigh the risks and rewards of using AI
2024-07-05 03:30

78% of organizations are tracking AI as an emerging risk while simultaneously adopting the technology themselves, according to AuditBoard. The report, based on a survey of over 400 security professionals in the US involved in their organization's approach to cybersecurity and digital risk, reveals organizations are making significant strides in digital risk management compared to previous years.

#AI
Ethereum mailing list breach exposes 35,000 to crypto draining attack
2024-07-04 16:17

A threat actor compromised Ethereum's mailing list provider and sent to over 35,000 addresses a phishing email with a link to a malicious site running a crypto drainer. Ethereum disclosed the incident in a blog post this week and said that it had no material impact on users.

Cyber Insurance Premiums Are Declining Worldwide as Businesses Improve Security, Howden Insurance Broker Report Finds
2024-07-04 15:58

Improved cyber hygiene among businesses has led to a reduction in cyber insurance premiums by 15% worldwide over the last two years, a new report from Howden Insurance Brokers has found. "Sarah Neild, head of cyber retail U.K. at Howden, explained why the cost of cyber insurance has declined. She told TechRepublic in an email,"Increased risk awareness off the back of persistent and high-profile attacks is one reason.

Hackers attack HFS servers to drop malware and Monero miners
2024-07-04 12:33

Hackers are targeting older versions of the HTTP File Server from Rejetto to drop malware and cryptocurrency mining software. The researchers say that during the attacks the hackers collect information about the system, install backdoors and various other types of malware.