Show more

A security vendor's investigation of infrastructure associated with a new, crypto-focused Magecart skimmer leads to discovery of cryptoscam sites, malware distribution marketplace, Bitcoin mixers, and more.

(Magecart is a notorious — and constantly evolving — syndicate of multiple groups that specializes in placing card skimmers on e-commerce sites to steal payment card information)

darkreading.com/threat-intelli

PSA

make sure Chrome stable build is updated

Google on Tuesday announced the release of Chrome 109 in the stable channel with patches for 17 vulnerabilities, including 14 bugs reported by external researchers - Most of the externally reported security defects are medium- and low-severity flaws, with only two of them rated ‘high severity’.

chromereleases.googleblog.com/

This is the company that claims: 'Privacy

Wiretap lawsuit accuses Apple of tracking iPhone users who opted out

(PDF URL)

regmedia.co.uk/2023/01/10/appl

Six malicious packages on PyPI, the Python Package Index, were found installing information-stealing and RAT (remote access trojan) malware while using Cloudflare Tunnel to bypass firewall restrictions for remote access.

bleepingcomputer.com/news/secu

What is the Flipper Zero campaign?

Experts have found a new phishing campaign that targets cybersecurity professionals and hacking enthusiasts. The campaign steals cryptocurrency and the personal information of victims.

Flipper Zero is behind the attack

Stealing crypto and data via Flipper Zero

cysecurity.news/2023/01/phishi

Fake Flipper Zero websites look to cause a big splash

high demand means more scams

A world of fake Flippers
Security researcher Dominic Alvieri warns of fake Flipper Zero websites claiming to offer the product for sale

twitter.com/AlvieriD/status/16

The good news is that the official Twitter account is linked from the official Flipper Zero website, so it's likely to be the real thing

twitter.com/flipper_zero

PSA

do a manual check for Android security update if you have not got one << it should be waiting

First update of 2023 patches 60 vulnerabilities

malwarebytes.com/blog/news/202

Kingston’s New IronKey Encrypted Drive Sports USB-C

although

If the USB-C connection is a must, you’ll have to wait until later in 2023 for the updated IronKey or get a USB-A one now

howtogeek.com/859218/kingstons

Yet another software supply chain attack to target open source repositories

The popular PyTorch Python project for data scientists and machine learning developers has become the latest open source project to be targeted with a dependency confusion attack.

darkreading.com/application-se

“pig butchering,” the new scam on the block

Pig butchering scams originated in China, where they came to be known by the Chinese version of the phrase shāzhūpán because of an approach in which attackers essentially fatten victims up and then take everything they’ve got

Hacker Lexicon: What Is a Pig Butchering Scam?

wired.com/story/what-is-pig-bu

A previously unknown Linux malware has been exploiting 30 vulnerabilities in multiple outdated WordPress plugins and themes to inject malicious JavaScript

/nosanitze

news.drweb.com/show/

Parental control apps may do more harm than good, according to researchers who found 18 bugs in eight Android apps with more than 20 million total downloads that could be exploited to, among many nefarious acts, control other devices on the parents' network

SEC Consult Vulnerability Lab discovered the vulnerabilities and found that the parent web dashboards were susceptible to cross-site request forgery (CSRF) and cross-site scripting (XSS) attacks

sec-consult.com/blog/detail/th

Threat Intelligence Through Web Scraping

Bright Data CEO Or Lenchner discusses how security teams are utilizing public Web data networks to safeguard their organizations from digital risks.

darkreading.com/threat-intelli

New details about a hack from last month show that tens of thousands of users happily gambling away on DraftKings may have had their personal information stolen thanks to account info purchased off the sports gambling site.

Some users reportedly found that hackers drained their accounts last month, though the company claimed that there was ‘no evidence’ its systems were breached.

gizmodo.com/draftkings-hackers

Hand caught in the cookie jar

you can't then ask for milk

Hacker Halts Sale of FBI's High-Profile InfraGard Database

The hacker continued expressing his regret, stating that they did not want to ‘‘cause any more trouble.’’

hackread.com/hacker-halt-sale-

Facebook Infrastructure Used by Hackers in Phishing Attack Chain

This recent phishing campaign tricks victims by using Facebook posts in its chain of attacks. The emails that were sent to the targets made it appear as though one of the recipients’ Facebook posts violated copyright, and they threatened to remove their accounts if no appeal was made within 48 hours.

gbhackers.com/facebook-infrast

A new cross-platform malware botnet named 'MCCrash' is infecting Windows, Linux, and IoT devices to conduct distributed denial of service attacks on Minecraft servers.

bleepingcomputer.com/news/secu

Another day, another data breach at Uber – This time around, a hacker has leaked stolen data on a prominent cybercrime and hacking forum.

the data has been leaked on BreachForums, which surfaced as an alternative to the now-defunct now-sized Raidforums

hackread.com/new-uber-data-bre

Google Launches Largest Distributed Database of Open Source Vulnerabilities

The Go-based tool,

github.com/google/osv-scanner

powered by the Open Source Vulnerabilities (OSV) database, is designed to connect "a project's list of dependencies with the vulnerabilities that affect them," Google software engineer Rex Pan in a post shared with The Hacker News.

thehackernews.com/2022/12/goog

Show more

⇄ Σ = Mᄃ² ⇆

CounterSocial is the first Social Network Platform to take a zero-tolerance stance to hostile nations, bot accounts and trolls who are weaponizing OUR social media platforms and freedoms to engage in influence operations against us. And we're here to counter it.