Uncategorized

The Internet’s biggest players are all affected by critical Log4Shell 0-day

Enlarge (credit: Kevin Beaumont) The list of services with Internet-facing infrastructure that is vulnerable to a critical zero-day vulnerability in the open source Log4j logging utility is immense and reads like a who’s…

300,000 MikroTik routers are ticking security time bombs, researchers say

Enlarge (credit: Getty Images) As many as 300,000 routers made by Latvia-based MikroTik are vulnerable to remote attacks that can surreptitiously corral the devices into botnets that steal sensitive user data and participate…

Zero-day in ubiquitous Log4j tool poses a grave threat to the Internet

Enlarge (credit: Getty Images) Exploit code has been released for a serious code-execution vulnerability in Log4j, an open source logging utility that's used in countless apps, including those used by large enterprise organizations,…

Tor is under threat from Russian censorship and Sybil attacks

Enlarge (credit: Getty Images) The Tor anonymity service and anticensorship tool has come under fire from two threats in recent weeks: The Russian government has blocked most Tor nodes in that country, and…

Malicious NPM packages are part of a malware “barrage” hitting repositories

Enlarge (credit: Getty Images) Researchers have found another 17 malicious packages in an open source repository, as the use of such repositories to spread malware continues to flourish. This time, the malicious code…

Verizon overrides users’ opt-out preferences in push to collect browsing history

Enlarge (credit: Getty Images | Scott Olson) Verizon is automatically enrolling customers in a new version of a program that scans mobile users' browser histories—even when those same users previously opted out of…

Microsoft seizes domains used by “highly sophisticated” hackers in China

Enlarge / Computer chip with Chinese flag, 3d conceptual illustration. (credit: Steve McDowell / Agefotostock) Microsoft said it has seized control of servers that a China-based hacking group was using to compromise targets…

SolarWinds hackers have a whole bag of new tricks for mass compromise attacks

Enlarge Almost exactly a year ago, security researchers uncovered one of the worst data breaches in modern history, if not ever: a Kremlin-backed hacking campaign that compromised the servers of network management provider…

AT&T failed to fix Ohio man’s broken Internet service for a month

Enlarge (credit: Getty Images | Ronald Martinez) Ohio resident John Sopko had to go a month without his AT&T fixed wireless Internet service because the company repeatedly failed to diagnose and fix the…

iPhones of US diplomats hacked using “0-click” exploits from embattled NSO

Enlarge (credit: Getty Images) The iPhones of nine US State Department officials were infected by powerful and stealthy malware developed by NSO Group, the Israeli exploit seller that has come under increasing scrutiny…