Google

Chrome 137 Fixes Critical Use-After-Free and Memory Corruption Vulnerabilities

Google has released Chrome version 137.0.7151.55/56 to the stable channel for Windows, Mac, and Linux, addressing 11 security vulnerabilities. This update includes critical patches for memory corruption issues and API implementation flaws

Defending Against UNC3944: Cybercrime Hardening Guidance from the Frontlines

A new wave of ransomware and extortion attacks is targeting the US retail sector, with threat intelligence suggesting the involvement of the advanced threat actor group Scattered Spider (UNC3944).

Researchers Uncover Malicious .desktop File Campaign Targeting Linux Systems

Researchers have identified a surge in malicious `.desktop` files targeting Linux systems. These files exploit standard desktop behaviors to execute hidden commands and download malware.

APT Groups and Ransomware Groups Collaborate to Mask Cyber Espionage Campaigns

Reports by Google Cloud and Trellix indicate there is growing collaboration between nation-state actors and cybercriminal networks for help with initial access and the use of custom malware sold on underground forums.
September 2, 2024

State-Backed Attackers and Commercial Surveillance Vendors Repeatedly Use the Same Exploits

Russian hackers exploited vulnerabilities in Safari and Chrome to launch cyberattacks from November 2023 to July 2024. They used a watering hole attack on Mongolian government websites to infect mobile users with malware, stealing information.

Government-Backed Actors Exploiting WinRAR Vulnerability

The recent campaigns targeting various sectors, including the energy and government sectors, highlight the effectiveness of known vulnerabilities even with available patches, emphasizing the importance of proactive software security measures.

Active North Korean Campaign Targeting Security Researchers

A new campaign has been discovered with similarities to a previous campaign, including the use of social media sites to build rapport with targets. The threat actors then engage in encrypted messaging and send a malicious file with a 0-day exploit.

Android 14 Introduces First-Of-Its-Kind Cellular Connectivity Security Features

Android 14 introduces new security measures to mitigate the risks associated with 2G networks, allowing users and enterprises to disable 2G connectivity and protect against potential attacks.

A Year in Review of Zero-Days Exploited In-the-Wild in 2022

The shift towards zero-click exploits and new browser mitigations has led to a decrease in browser zero-days, but attackers are still finding ways to exploit vulnerabilities in other components.

Protect and manage browser extensions using Chrome Browser Cloud Management

Chrome Browser Cloud Management offers extension management capabilities and reporting to enable organizations to control extension usage and mitigate potential security risks.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags