Google Chrome’s Safe Browsing Now Protect 1 Billion Users With 300,000 Deep Scans
| | | |

Google Chrome’s Safe Browsing Now Protect 1 Billion Users With 300,000 Deep Scans

In honor of Safer Internet Day, Google has announced a significant milestone in online security, more than 1 billion Chrome users are now safeguarded by the browser’s Enhanced Protection mode. This advanced security feature, introduced in 2020 as part of Google Safe Browsing, offers twice the protection against phishing and scams compared to the Standard…

Treasury hackers also breached US foreign investments review office
| |

Treasury hackers also breached US foreign investments review office

Silk Typhoon Chinese state-backed hackers have reportedly breached a Treasury Department office that reviews foreign investments for national security risks. CNN reported on Friday, citing U.S. officials familiar with the matter, that the attackers gained access to the Committee on Foreign Investment in the United States (CFIUS) systems. The CFIUS is a government office and interagency committee…

WordPress Mandates Two-Factor Authentication for Plugin and Theme Developers
| |

WordPress Mandates Two-Factor Authentication for Plugin and Theme Developers

WordPress.org has announced a new account security measure that will require accounts with capabilities to update plugins and themes to activate two-factor authentication (2FA) mandatorily. The enforcement is expected to come into effect starting October 1, 2024. “Accounts with commit access can push updates and changes to plugins and themes used by millions of WordPress…

New Linux Malware ‘sedexp’ Hides Credit Card Skimmers Using Udev Rules
| |

New Linux Malware ‘sedexp’ Hides Credit Card Skimmers Using Udev Rules

Cybersecurity researchers have uncovered a new stealthy piece of Linux malware that leverages an unconventional technique to achieve persistence on infected systems and hide credit card skimmer code. The malware, attributed to a financially motivated threat actor, has been codenamed sedexp by Aon’s Stroz Friedberg incident response services team. “This advanced threat, active since 2022,…

Sitting Ducks DNS Attack Hijack 35,000 Domains
|

Sitting Ducks DNS Attack Hijack 35,000 Domains

Threat actors have been exploiting the attack vector known as Sitting Ducks since at least 2019 to conduct malware delivery, phishing, brand impersonation, and data exfiltration by exploiting flaws in DNS. This widespread flaw, affecting multiple DNS providers, enables domain hijacking without detection. Besides this, the researchers from Infoblox and Eclypsium have unveiled this critical…