30 Mar Bing search results hijacked via misconfigured Microsoft app A misconfigured Microsoft application allowed anyone to log in and modify Bing.com search results in real-time, as well as inject XSS attacks to potentially breach the accounts of Office 365 users. […]
30 Mar New AlienFox toolkit steals credentials for 18 cloud services A new modular toolkit called ‘AlienFox’ allows threat actors to scan for misconfigured servers to steal authentication secrets and credentials for cloud-based email services. […]
29 Mar Hackers compromise 3CX desktop app in a supply chain attack A digitally signed and trojanized version of the 3CX Voice Over Internet Protocol (VOIP) desktop client is reportedly being used to target the company’s customers in an ongoing supply chain attack. […]
29 Mar Steam will drop support for Windows 7 and 8 in January 2024 Valve announced that its Steam online game platform will officially drop support for the Windows 7, Windows 8, and Windows 8.1 platforms starting January 1st, 2024. […]
29 Mar SafeMoon ‘burn’ bug abused to drain $8.9 million from liquidity pool The SafeMoon token liquidity pool lost $8.9 million after a hacker exploited a newly created ‘burn’ smart contract function that artificially inflated the price, allowing the actors to sell SafeMoon at a much higher price. […]
29 Mar Microsoft Defender mistakenly tagging URLs as malicious Microsoft Defender is mistakenly flagging legitimate links as malicious, with some customers having already received dozens of alert emails since the issues began over five hours ago. […]
29 Mar Experts call for pause on AI training citing risks to humanity AI professors and developers have co-signed an open letter to artificial intelligence labs, calling them to pause the development and training of AI systems more powerful than GPT-4 for at least six months. […]
29 Mar Google finds more Android, iOS zero-days used to install spyware Google’s Threat Analysis Group (TAG) discovered several exploit chains using Android, iOS, and Chrome zero-day and n-day vulnerabilities to install commercial spyware and malicious apps on targets’ devices. […]
28 Mar Trojanized Tor browsers target Russians with crypto-stealing malware A surge of trojanized Tor Browser installers targets Russians and Eastern Europeans with clipboard-hijacking malware that steals infected users’ cryptocurrency transactions. […]
28 Mar Windows 11 KB5023774 update causes Red Dead Redemption 2 launch issues Microsoft is investigating a known issue triggered by the KB5023774 March 2023 preview update and causing Red Dead Redemption 2 to stop opening on some devices. […]