North Korean hackers have stolen billions in crypto by posing as VCs, recruiters and IT workers

Security researchers say North Korean hackers have infiltrated hundreds of organizations with the goal of taking money and stealing data to further the regime’s nuclear weapons program.

© 2024 TechCrunch. All rights reserved. For personal use only.

Security News | TechCrunch – ​Read More

The Future of Serverless Security in 2025: From Logs to Runtime Protection

Serverless environments, leveraging services such as AWS Lambda, offer incredible benefits in terms of scalability, efficiency, and reduced operational overhead. However, securing these environments is extremely challenging. The core of current serverless security practices often revolves around two key components: log monitoring and static analysis of code or system configuration. But here is

The Hacker News – ​Read More

T-Mobile Shares More Information on China-Linked Cyberattack

T-Mobile has confirmed being targeted by hackers, likely China’s Salt Typhoon, but reiterated that the attack was blocked.

The post T-Mobile Shares More Information on China-Linked Cyberattack appeared first on SecurityWeek.

SecurityWeek – ​Read More

Microsoft Patches Exploited Vulnerability in Partner Network Website

Microsoft informed customers that vulnerabilities affecting cloud, AI and other services have been patched, including an exploited flaw.

The post Microsoft Patches Exploited Vulnerability in Partner Network Website appeared first on SecurityWeek.

SecurityWeek – ​Read More

XMLRPC npm Library Turns Malicious, Steals Data, Deploys Crypto Miner

Cybersecurity researchers have discovered a software supply chain attack that has remained active for over a year on the npm package registry by starting off as an innocuous library and later adding malicious code to steal sensitive data and mine cryptocurrency on infected systems.
The package, named @0xengine/xmlrpc, was originally published on October 2, 2023 as a JavaScript-based XML-RPC

The Hacker News – ​Read More

Cybercriminals Exploit Popular Game Engine Godot to Distribute Cross-Platform Malware

A popular open-source game engine called Godot Engine is being misused as part of a new GodLoader malware campaign, infecting over 17,000 systems since at least June 2024.
“Cybercriminals have been taking advantage of Godot Engine to execute crafted GDScript code which triggers malicious commands and delivers malware,” Check Point said in a new analysis published Wednesday. “The technique

The Hacker News – ​Read More

Flipper Zero goes retro with this cool limited-edition version (and it’s back for Black Friday)

If you want one, you’d better act fast.

Latest stories for ZDNET in Security – ​Read More

U.S. Telecom Giant T-Mobile Detects Network Intrusion Attempts from Wireline Provider

U.S. telecom service provider T-Mobile said it recently detected attempts made by bad actors to infiltrate its systems in recent weeks but noted that no sensitive data was accessed.
These intrusion attempts “originated from a wireline provider’s network that was connected to ours,” Jeff Simon, chief security officer at T-Mobile, said in a statement. “We see no instances of prior attempts like

The Hacker News – ​Read More

T-Mobile says telco hackers had ‘no access’ to customer call and text message logs

The phone giant said hackers did not access the contents or logs of customer phone calls or text messages, during an industry-wide attack on phone and internet companies.

© 2024 TechCrunch. All rights reserved. For personal use only.

Security News | TechCrunch – ​Read More

Investigators think a Chinese ship purposefully cut critical data cables  

European investigators believe that a Chinese commercial ship purposefully dragged its anchor in order to slash through two critical data cables.

© 2024 TechCrunch. All rights reserved. For personal use only.

Security News | TechCrunch – ​Read More