Security News
![Apple discloses 2 new zero-days exploited to attack iPhones, Macs](/static/build/img/news/apple-discloses-2-new-zero-days-exploited-to-attack-iphones-macs-small.jpg)
Apple released emergency security updates to fix two new zero-day vulnerabilities exploited in attacks targeting iPhone and Mac users, for a total of 13 exploited zero-days patched since the start of the year. Since the start of the year, Apple has patched 13 zero-day bugs exploited in attacks against devices running iOS, macOS, iPadOS, and watchOS. While Apple has yet to disclose details regarding attacks exploiting the flaws patched today, it acknowledged that CVE-2023-41064 was found and reported by Citizen Labs, whose researchers have previously shared information on other Apple zero-days exploited to deploy commercial spyware on computers and iPhones in targeted attacks.
![Google: State hackers attack security researchers with new zero-day](/static/build/img/news/google-state-hackers-attack-security-researchers-with-new-zero-day-small.jpg)
Google's Threat Analysis Group says North Korean state hackers are again targeting security researchers in attacks using at least one zero-day in an undisclosed popular software. Researchers attacked in this campaign are involved in vulnerability research and development, according to Google's team of security experts that protects the company's users from state-sponsored attacks.
![Windows cryptomining attacks target graphic designer's high-powered GPUs](/static/build/img/news/windows-cryptomining-attacks-target-graphic-designer-s-high-powered-gpus-small.jpg)
Cybercriminals are leveraging a legitimate Windows tool called 'Advanced Installer' to infect the computers of graphic designers with cryptocurrency miners. The attackers promote installers for popular 3D modeling and graphic design software such as Adobe Illustrator, Autodesk 3ds Max, and SketchUp Pro, likely through black hat search engine optimization techniques.
![Alert: Apache SuperSet Vulnerabilities Expose Servers to Remote Code Execution Attacks](/static/build/img/news/alert-apache-superset-vulnerabilities-expose-servers-to-remote-code-execution-attacks-small.jpg)
Patches have been released to address two new security vulnerabilities in Apache SuperSet that could be exploited by an attacker to gain remote code execution on affected systems. Outside of these weaknesses, the latest version of Superset also remediates a separate improper REST API permission issue that allows for low-privilege users to carry out server-side request forgery attacks.
![Flipper Zero can be used to launch iOS Bluetooth spam attacks](/static/build/img/news/flipper-zero-can-be-used-to-launch-ios-bluetooth-spam-attacks-small.jpg)
The Flipper Zero portable wireless pen-testing and hacking tool can be used to aggressively spam Bluetooth connection messages at Apple iOS devices, such as iPhones and iPads. Apple devices supporting Bluetooth Low Energy technology utilize advertising packets to announce their presence to other devices.
![Mirai variant infects low-cost Android TV boxes for DDoS attacks](/static/build/img/news/mirai-variant-infects-low-cost-android-tv-boxes-for-ddos-attacks-small.jpg)
A new Mirai malware botnet variant has been spotted infecting inexpensive Android TV set-top boxes used by millions for media streaming. The primary targets of this campaign are low-cost Android TV boxes like Tanix TX6 TV Box, MX10 Pro 6K, and H96 MAX X3, which feature quad-core processors capable of launching powerful DDoS attacks even in small swarm sizes.
![September Android updates fix zero-day exploited in attacks](/static/build/img/news/september-android-updates-fix-zero-day-exploited-in-attacks-small.jpg)
The September 2023 Android security updates tackle 33 vulnerabilities, including a zero-day bug currently targeted in the wild. "Exploitation for many issues on Android is made more difficult by enhancements in newer versions of the Android platform. We encourage all users to update to the latest version of Android where possible."
![Way Too Vulnerable: Join this Webinar to Understand and Strengthen Identity Attack Surface](/static/build/img/news/way-too-vulnerable-join-this-webinar-to-understand-and-strengthen-identity-attack-surface-small.jpg)
In today's digital age, it's not just about being online but how securely your organization operates online. Regardless of size or industry, every organization heavily depends on digital assets.
![Reaper: Open-source reconnaissance and attack proxy workflow automation](/static/build/img/news/reaper-open-source-reconnaissance-and-attack-proxy-workflow-automation-small.jpg)
Reaper is an open-source reconnaissance and attack proxy, built to be a modern, lightweight, and efficient equivalent to Burp Suite/ZAP. It focuses on automation, collaboration, and building universally distributable workflows. Reaper is a work in progress, but it's already capable of much.
![German financial agency site disrupted by DDoS attack since Friday](/static/build/img/news/german-financial-agency-site-disrupted-by-ddos-attack-since-friday-small.jpg)
The German Federal Financial Supervisory Authority announced today that an ongoing distributed denial-of-service attack has been impacting its website since Friday. BaFin is Germany's financial regulatory authority, part of the Federal Ministry of Finance, responsible for supervising 2,700 banks, 800 financial, and 700 insurance service providers.