Russian State Hackers Target Organizations With Device Code Phishing

Russian hackers have been targeting government, defense, telecoms, and other organizations in a device code phishing campaign.

The post Russian State Hackers Target Organizations With Device Code Phishing appeared first on SecurityWeek.

SecurityWeek – ​Read More

127 Servers of Bulletproof Hosting Service Zservers Seized by Dutch Police

After governments announced sanctions against the Zservers/XHost bulletproof hosting service, Dutch police took 127 servers offline.

The post 127 Servers of Bulletproof Hosting Service Zservers Seized by Dutch Police appeared first on SecurityWeek.

SecurityWeek – ​Read More

Downloads of DeepSeek’s AI Apps Paused in South Korea Over Privacy Concerns

DeepSeek has temporarily paused downloads of its chatbot apps in South Korea while it works with local authorities to address privacy concerns.

The post Downloads of DeepSeek’s AI Apps Paused in South Korea Over Privacy Concerns appeared first on SecurityWeek.

SecurityWeek – ​Read More

New Golang-Based Backdoor Uses Telegram Bot API for Evasive C2 Operations

Cybersecurity researchers have shed light on a new Golang-based backdoor that uses Telegram as a mechanism for command-and-control (C2) communications.
Netskope Threat Labs, which detailed the functions of the malware, described it as possibly of Russian origin.
“The malware is compiled in Golang and once executed it acts like a backdoor,” security researcher Leandro Fróes said in an analysis

The Hacker News – ​Read More

Xerox Versalink Printer Vulnerabilities Enable Lateral Movement

Xerox released security updates to resolve pass-back attack vulnerabilities in Versalink multifunction printers.

The post Xerox Versalink Printer Vulnerabilities Enable Lateral Movement appeared first on SecurityWeek.

SecurityWeek – ​Read More

⚡ THN Weekly Recap: Google Secrets Stolen, Windows Hack, New Crypto Scams and More

Welcome to this week’s Cybersecurity News Recap. Discover how cyber attackers are using clever tricks like fake codes and sneaky emails to gain access to sensitive data. We cover everything from device code phishing to cloud exploits, breaking down the technical details into simple, easy-to-follow insights.
⚡ Threat of the Week
Russian Threat Actors Leverage Device Code Phishing to Hack

The Hacker News – ​Read More

Estonian spy chief: ‘Hybrid schmybrid, what’s happening is attacks’

In a late panel discussion on Saturday at the Munich Security Conference, Kaupo Rosin protested the use of the word which has been applied to a range of hostile activities that are deemed to be deniable or below the threshold justifying an armed response.

The Record from Recorded Future News – ​Read More

What is an encryption backdoor?

Talk of backdoors in encrypted services is once again doing the rounds after reports emerged that the U.K. government is seeking to force Apple to open up iCloud’s end-to-end encrypted (E2EE) device backup offering. Officials were said to be leaning on Apple to create a “backdoor” in the service that would allow state actors to […]

© 2024 TechCrunch. All rights reserved. For personal use only.

Security News | TechCrunch – ​Read More

The Official DOGE Website Launch Was a Security Mess

Plus: Researchers find RedNote lacks basic security measures, surveillance ramps up around the US-Mexico border, and the UK ordering Apple to create an encryption backdoor comes under fire.

Security Latest – ​Read More

Android’s New Feature Blocks Fraudsters from Sideloading Apps During Calls

Google is working on a new security feature for Android that blocks device owners from changing sensitive settings when a phone call is in progress.
Specifically, the in-call anti-scammer protections include preventing users from turning on settings to install apps from unknown sources and granting accessibility access. The development was first reported by Android Authority.
Users who attempt

The Hacker News – ​Read More