Security
Headlines
HeadlinesLatestCVEs

Source

DARKReading

'Zaraza' Bot Targets Google Chrome to Extract Login Credentials

The data-stealing malware threatens the cyber safety of individual and organizational privacy by infecting a range of Web browsers.

DARKReading
#vulnerability#web#windows#google#microsoft#auth#chrome
QBot Expands Initial Access Malware Strategy With PDF-WSF Combo

The infamous Trojan's operators are switching up tactics with the use of simulated business correspondence, which helps instill trust with intended victims, and a stealthier payload.

Researchers Discover First-Ever Major Ransomware Targeting macOS

In targeting Apple users, LockBit is going where no major ransomware gang has gone before. But it's a warning shot, and Mac users need not worry yet.

Where There's No Code, There's No SDLC

How can we build security back into software development in a low-code/no-code environment?

APT41 Taps Google Red-Teaming Tool in Targeted Info-Stealing Attacks

China-linked APT41 group targeted a Taiwanese media organization and an Italian job agency with standard, open source penetration test tools, in a change in strategy.

Why Your Anti-Fraud, Identity & Cybersecurity Efforts Should Be Merged

To address the rising risk of online fraud, stolen identities, and cyberattacks, innovative organizations have begun converging their security functions — here's how yours can prepare.

'Goldoson' Malware Sneaks into Google Play Apps, Racks Up 100M Downloads

Malware that can steal data, track location, and perform click fraud was inadvertently built into apps via an infected third-party library, highlighting supply chain risk.

Beyond CVEs: The Key to Mitigating High-Risk Security Exposures

Use ongoing exposure management to parse the riskiest exposures and probable attack paths, then identify and plug the choke points.

How Zero Trust Can Protect Systems Against Generative AI Agents

Researchers explore a love-hate relationship with AI tools like ChatGPT, which can be used to both attack and defend more efficiently.

Recycled Core Routers Expose Sensitive Corporate Network Info

Researchers are warning about a dangerous wave of unwiped, secondhand core-routers found containing corporate network configurations, credentials, and application and customer data.