Skip to main content

Security

North Korean hackers once again exploit Internet Explorer’s leftover bits

posted onDecember 9, 2022
by l33tdawg
Credit: Arstechnica

Microsoft's Edge browser has replaced Internet Explorer in almost every regard, but some exceptions remain. One of those, deep inside Microsoft Word, was exploited by a North-Korean-backed group this fall, Google security researchers claim.

It's not the first time the government-backed APT37 has utilized Internet Explorer's lingering presence, as Google's Threat Analysis Group (TAG) notes in a blog post. APT37 has had repeated success targeting South Korean journalists and activists, plus North Korean defectors, through a limited but still successful Internet Explorer pathway.

How secure a Twitter replacement is Mastodon? Let us count the ways

posted onNovember 30, 2022
by l33tdawg
Credit: Arstechnica

As Elon Musk critics flee from Twitter, Mastodon seems to be the most common replacement. In the last month, the number of monthly active users on Mastodon has rocketed more than threefold, from about 1 million to 3.5 million, while total number of users jumped from about 6.5 million to 8.7 million.

Google and other OEMs have yet to patch a critical Android security flaw

posted onNovember 27, 2022
by l33tdawg
Credit: Flickr

Google has detailed a critical security flaw for phones containing a Mali GPU that has yet to be properly addressed.

Google's Project Zero team posted on its official blog details on what this issue is and why it is so important that a fix for it comes out immediately. The critical security issue, CVE-2022-33917, affects devices containing ARM's Mali GPU. The report lists users of devices from Google, Samsung, Xiaomi, and OPPO with a Mali GPU are at risk of this critical unpatched security flaw.

Zero-day are exploited on a massive scale in increasingly shorter timeframes

posted onNovember 6, 2022
by l33tdawg
Credit: Security Affairs

According to the Digital Defense Report published by Microsoft, threat actors are increasingly leveraging publicly-disclosed zero-day vulnerabilities to target organizations worldwide.

The researchers noticed a reduction in the time between the announcement of a vulnerability and the commoditization of that vulnerability and remarked on the importance of the patch management process.

Hackers get into Dropbox developer accounts on GitHub, access 130 code repositories and more

posted onNovember 2, 2022
by l33tdawg
Credit: The Record

Online storage giant Dropbox announced this week that a phishing campaign targeting its developers was successful, allowing hackers to gain access to the company’s GitHub accounts.

In a statement on Tuesday, Dropbox said the hackers were able to copy 130 code repositories and gain access to credentials as well as information on Dropbox employees, current and past customers, sales leads, and vendors.