New ATM Malware Can Steal Money From Any European ATM & 60% of ATMs Worldwide

Listed for sale on a hacker forum, the malware can generate up to $30,000 per ATM. It is fully automated, simplifying its deployment and operation. Alternatively, the malware can be operated manually, offering cybercriminals flexibility. The malware is fully automated, simplifying its deployment and operation,reported the website DailyDarkweb. source: www.techworm.net

May 30, 2024 · 1 min · 50 words · David Cannon

U.S. Takes Down World’s Largest Botnet “911 S5” With 19 Million Infected Devices

If convicted on all counts, he could face a maximum sentence of 65 years in prison. The DoJ said it is actively pursuing Wangs extradition from Singapore to the United States. source: www.techworm.net

May 30, 2024 · 1 min · 33 words · Paige Greene

YouTube Playables Video Games Are Now Available for Mobile & Desktop

According to the latest blog post from YouTube, Playables video games are now available to all users. Users from the US can access these games from the YouTube app for iOS/Android and the desktop webpage. Playables is a collection of single-player and multi-player video games integrated into the core of YouTube. This means users can start playing the game without additional downloads or installation. YouTube says that Playablesare currently supported on Android, iOS and desktop web....

May 30, 2024 · 2 min · 256 words · Jerry Morrow

90+ Android Apps With Banking Malware Found On Play Store With 5.5M Installs

At the time of Zscalers analysis, these two apps had already accumulated 70,000 installations. Anatsa banking malware uses a dropper technique, where the initial software appears clean to users upon installation. It utilizes remote payloads retrieved from command-and-control (C2) servers to carry out further malicious activity. Upon successful verification, it proceeds to download the third stage and final payload from the remote server. Further, the payload decrypts the DEX file during runtime using a static key embedded within the code....

May 29, 2024 · 1 min · 129 words · Laura Knight

BreachForums Revived Just Weeks After FBI Seizure

This website has been taken down by the FBI and DOJ with assistance from international partners. We are reviewing the sites backend data. Besides the above, one of the forums admins, Baphomet, was arrested in the process. Interestingly, visitors to the site are now being asked to create an account to view the content. It is unclear if the current administrator is the original ShinyHunters hacker who operated on BreachForums....

May 29, 2024 · 1 min · 88 words · Brian Hall

Ticketmaster Hacked: 560 Million Users Confidential Data Stolen & on Sale

Ticketmaster became a victim of a cybersecurity breach this week and the estimated loss is surmounting. The infamous hacking group ShinyHunters gained access to confidential data of a whopping 560 million users. The hackers obtained all the crucial personal details which is useful for targeting a person. This batch of stolen data is invaluable to interested parties who will happily shell out half a million. Meanwhile, Ticketmaster hasnt confirmed anything openly but it isnt the first time the ticket sales behemoth was breached....

May 29, 2024 · 1 min · 130 words · Sarah Snyder

Four Use Cases for Fully Homomorphic Encryption (FHE) Technology

Fully Homomorphic Encryption (FHE) is a cryptographic technology thats tipped for big things. Here are just four use cases for Fully Homomorphic Encryption. In-person voting may be inefficient, but its hard to falsify. Financial Analysis Perhaps one of the most compelling use cases for FHE is for processing financial data. From securing messaging apps to IoT sensor data, FHE has a host of applications. source: www.techworm.net

May 28, 2024 · 1 min · 66 words · Jorge Abbott

Hackers Attack Check Point VPNs To Breach Enterprise Networks

It encrypts all traffic users send and receive. We have recently witnessed compromised VPN solutions, including various cyber security vendors. Check Point is not the first company whose VPN devices are being targeted in ongoing attacks. source: www.techworm.net

May 28, 2024 · 1 min · 38 words · Kelly Houston

GitLab Fixes High-Severity Account Takeover Vulnerability

While successful exploitation does not require any authentication, it still requires user interaction which increases the attacks complexity. Security researcher matanber discovered and reported the issue to GitLab via the HackerOne bug bounty platform. It was patched on May 22, 2024, with versions 17.0.1, 16.11.3, and 16.10.6. source: www.techworm.net

May 24, 2024 · 1 min · 49 words · Gregory Davis

Google AI Asked User To Drink Urine, Jump Off Bridge, Eat Rocks, Use Glue In Pizza & More

It has only been a few days since Google launched the AI Overview in the US. Yet, its AI Overview for Google Search results has acquired a bad reputation already. According to multiple users on Twitter and Threads, Googles AI Overview has delivered misleading advice for common queries. In another one, the AI recommendedusing non-toxic glue to make the cheese stick better to the pizza. When askedwhich mammal has the most bones, the AI provided Python as the answer....

May 24, 2024 · 1 min · 165 words · Dominique Koch MD

Netfilm Shuts Down; 3 Best Alternatives

Netfilm.app, a popularfree moviesand TV show streaming site, has shut down. The news surfaced after users began sharing their troubles in accessing the website to watch content. The abrupt shutdown was because of a DMCA notice delivered to the site admins. Netfilm wasnt legal but that is what drew users to the website and made it popular among streaming pirates. Losmovies Losmovies is a free streaming site with tons of shows and movies....

May 23, 2024 · 2 min · 220 words · Felicia Reynolds

Critical GitHub Enterprise Server Flaw Allows Auth Bypass, Fix Now

GitHub has published a security advisory that mentions the updates known issues. source: www.techworm.net

May 22, 2024 · 1 min · 14 words · Frances Anderson

New Recall AI on Windows 11 Will Record Every Move You Make On Your PC

The Recall feature works like a personal historian for your Windows 11 PC. It will log everything you do on the PC and save this data as snapshots. This feature uses Live Captions and Translation to make each task on your PC searchable. Source: Microsoft This way, you might search for something said during a meeting and watch the meeting entirely. Recall thus enables photographic memory for your Copilot Plus PCs....

May 21, 2024 · 1 min · 197 words · Maria Taylor