Meta Fined €251M For 2018 Data Breach That Affected 29M Facebook Accounts

This feature allowed users to view their own Facebook page as another user would. The video uploader generated a user token that gave the attackers full access to the other users Facebook profile. We have a wide range of industry-leading measures in place to protect people across our platforms. source: www.techworm.net

December 18, 2024 · 1 min · 51 words · Christopher Torres

FBI Warns Of HiatusRAT Malware Targeting Web Cams & Other IoT Devices

HiatusRAT is a Remote Access Trojan (RAT) whose latest iteration has likely been employed since July 2022. The Hiatus campaign originally targeted outdated internet edge devices. Many of these vulnerabilities remain unaddressed by the vendors. source: www.techworm.net

December 17, 2024 · 1 min · 37 words · Kevin Thomas

SpyLoan Malware Hits 8 Million Android Users

Security researchers at McAfee Labs have identified 15 malicious Android apps that contain malware known as SpyLoan. These apps have been downloaded over 8 million times from the Google Play Store. These predatory loan apps disguise themselves as legitimate financial services, luring unsuspecting users into downloading them. SpyLoan apps masquerade as legitimate loan providers under deceptive names and logos, creating a false sense of trust. Once the loan is disbursed, users often find themselves trapped in high-interest repayment schemes....

December 2, 2024 · 1 min · 131 words · Amanda Manning

Dramacool Shuts Down; 3 Best Alternatives

Earlier this month, Dramacools websites, along with its communication hub Asianwiki.co, became inaccessible. Due to the copyright, we cannot launch the sites anymore. We apologize to every fan that always supported and loved DRAMACOOL. Table Of Contents Best Dramacool Alternatives 1. Netflix Netflix is a subscription-based streaming service that offers new users a free one-month trial. While available globally, the content library varies by region. While not free, it allows users to download content for offline viewing within the app....

December 1, 2024 · 1 min · 94 words · Catherine Castro

Hackers Exploit Popular Godot Game Engine To Spread Malware

The file contained the XMRigconfiguration related to the campaign, which was visited 206,913 times. Approximately 200 repositories and more than 225 Stargazer Ghost accounts were used to distribute GodLoader throughout September and October. In addition to these static files, .pck files can include scripts written in GDScript (.gd). This feature gives attackers many possibilities, from downloading additional malware to executing remote payloadsall while remaining undetected. The Godot Engine is a programming system with a scripting language....

November 28, 2024 · 1 min · 198 words · Colin Anderson

CISA Warns of Active Exploitation of Critical Array Networks Vulnerability

The move follows reports of active exploitation in the wild. This could pose significant risks to government systems and the private sector. The product can be exploited via a vulnerable URL, Array Networksstatedin a support page. This vulnerability mainly affects ArrayOS AG 9.4.0.481 and earlier versions. Array Networks addressed the flaw with the release of ArrayOS AG version 9.4.0.484 in March 2023. The web link hardware vendor strongly recommends that organizations update their affected devices to this version immediately....

November 26, 2024 · 1 min · 110 words · Brad Oconnor

Windows 11 bug Increases audio volume to 100%, Microsoft confirms

Microsoft has confirmed that a new bug inWindows 11 24H2is automatically increasing the audio volume level to 100%. Currently, there is no fix available for the audio issue. Microsoft is working on a resolution and is expected to provide more information when available. source: www.techworm.net

November 22, 2024 · 1 min · 45 words · Julia Young

Apple Releases Urgent Updates To Patch Actively Exploited Zero-Day macOS Vulnerabilities

It could lead to a cross-site scripting (CSS) attack when processing maliciously crafted web content. Apple has not provided any information on how the above vulnerabilities were exploited. source: www.techworm.net

November 20, 2024 · 1 min · 30 words · Harry Young

Chinese Hackers Exploit Fortinet Zero-Day To Harvest VPN Credentials

Volexity also tracks BrazenBamboo as the developer of other malware families, such as LIGHTSPY and DEEPPOST. Volexity found the FortiClient plugin was included through a library with the filename msenvico.dll. However, the issue remains unpatched to date, and no CVE has been assigned to it. Volexitys analysis provides evidence that BrazenBamboo is a well-resourced threat actor who maintains multi-platform capabilities with operational longevity. source: www.techworm.net

November 19, 2024 · 1 min · 65 words · Alexander Terry

Fake AI Video Generators Stole Data From Windows, macOS

How The Campaign Works When you nudge the images, you are taken to two websiteseditproai[. ]pro and editproai[. ]org for the EditProAI applicationwhich were created to push Windows and macOS malware, respectively. These sites are designed to appear credible, featuring professional layouts and ubiquitous cookie banners. Once downloaded, the malware transmits stolen data to a server located at proai[. ]club/panelgood/, where attackers can retrieve it later, g0njxa says. Areport from AnyRun, a sandbox malware analysis service, confirmed that the Windows variant is Lumma Stealer....

November 17, 2024 · 1 min · 86 words · Melissa Hurst

NSO Group Exploited WhatsApp Zero-Day Even After Lawsuit, Court Docs Say

NSOs Head of R&D has confirmed that those vectors worked precisely as alleged by Plaintiffs. reads the court filing. NSO witnesses reportedly declined to confirm whether the spyware maker continued developing WhatsApp-based malware vectors afterward. The company acknowledged that its employees created and used WhatsApp accounts to develop malware for themselves and their clients. source: www.techworm.net

November 17, 2024 · 1 min · 56 words · Rachel Velasquez

CISA Issues Warning On Two New Critical Security Flaws In Palo Alto Networks

Attackers can also use this to create and read arbitrary files on the Expedition system. Palo Alto Networks has released security updates in Expedition 1.2.96 and all later versions to address the above vulnerabilities. source: www.techworm.net

November 16, 2024 · 1 min · 36 words · Melanie Cervantes

How to View Locked Facebook Profile Photos ( Download Photos )

However, what if you want to view a users locked profile photos on Facebook? Table Of Contents How to View Locked Facebook Profile Photos? Heres what you should probably do. pop swing open the profile of the person whose profile and cover picture you want to check. Right select blank space and selectInspect. Switch to theSourceson the Inspect Element prompt. At the left sidebar, you’re gonna wanna expand the pages that starts with scontent....

November 14, 2024 · 3 min · 460 words · Christopher Gross