Threat Actor: Cybercriminals | cybercriminals Victim: Individuals seeking pirated software | individuals seeking pirated software
Key Point :
Attackers pose as guides on YouTube, providing fake software installation tutorials to lure victims.…Threat Actor: Cybercriminals | cybercriminals Victim: Individuals seeking pirated software | individuals seeking pirated software
Key Point :
Attackers pose as guides on YouTube, providing fake software installation tutorials to lure victims.…Threat Actor: Malicious actors | malicious actors Victim: macOS users | macOS users
Key Point :
The vulnerability CVE-2024-54498 has a CVSS score of 8.8, indicating high severity.…Keypoints :
Proton Mail experienced a worldwide outage due to a surge in database connections during infrastructure migration.…Keypoints:
Hackers breached Gravy Analytics, a location data broker selling user coordinates to various third parties.…Threat Actor: Cybercriminals | cybercriminals Victim: Mobile users | mobile users
Key Point :
Attackers send smishing texts that appear legitimate, prompting users to reply to enable links.…Threat Actor: Russian Intelligence | Russian Intelligence Victim: Citizens of Belarus, Kazakhstan, Kyrgyzstan, Uzbekistan, Cuba, and Nicaragua | citizens of Belarus, Kazakhstan, Kyrgyzstan, Uzbekistan, Cuba, and Nicaragua
Key Point :
Acquisition of SORM technology by multiple governments enhances their ability to wiretap citizens.…Keypoints:
The guests, including Shobhit Varshney, Skyler Speakman, and Volkmar Uhlig, express excitement about NVIDIA’s DIGITS, a desktop supercomputer capable of running large AI models locally.…Threat Actor: Russian Developers | Russian Developers Victim: macOS Users | macOS Users
Key Point :
Banshee can collect sensitive data including passwords, system information, and cryptocurrency wallet details.…“`html
Check Point Research has identified a new version of the Banshee macOS stealer malware, which has been evading detection since September 2024. The malware targets macOS users, stealing sensitive information and utilizing an encryption algorithm similar to Apple’s XProtect. Despite the shutdown of its original operations after a code leak, Banshee continues to be distributed through phishing websites and malicious GitHub repositories.…Threat Actor: N/A | N/A Victim: iPhone owners | iPhone owners
Key Point :
Apple confirms that Siri data has never been used for marketing profiles or advertising.…Threat Actor: Unknown | unknown Victim: GFI KerioControl users | GFI KerioControl
Key Point :
The vulnerability allows attackers to perform HTTP response splitting, leading to reflected cross-site scripting (XSS) and RCE.…Keypoints :
Multiple vulnerabilities discovered in Ivanti products. Most severe vulnerability allows for remote code execution.…Threat Actor: John Binns | John Binns Victim: T-Mobile | T-Mobile
Key Point :
The 2021 breach affected over 76.6 million individuals, including more than 2 million Washington residents.…The video discusses a new vulnerability that was revealed in the Common Unix Printing System (CUPS), particularly affecting network printers on Linux systems. Alex Lyn joins Darren Kitchen to explore this remote code execution (RCE) exploit and demonstrate some of its implications, including how malicious printers can potentially compromise systems on the same network.…