Articles

  • 1 week ago | darkreading.com | Elizabeth Montalbano

    The GodFather Android banking Trojan has evolved significantly, with an advanced on-device virtualization technique targeting financial institutions in Turkey, which allows it to hijack legitimate mobile banking and cryptocurrency applications more deceptively than ever. The method creates a complete, isolated virtual environment on the victim's mobile device by installing a malicious "host" application containing a virtualization framework, researchers from Zimperium zLabs have discovered.

  • 1 week ago | darkreading.com | Elizabeth Montalbano

    Attackers are actively targeting a critical flaw in a popular Python-based Web app for building AI agents and workflows to unleash a powerful botnet that can cause full system compromise, distributed denial-of-service (DDoS) attacks, and potential loss or exposure of sensitive information hosted on affected servers.

  • 1 week ago | darkreading.com | Elizabeth Montalbano

    A newly identified threat group has weaponized GitHub repositories offering what appear to be legitimate pen-testing and other security tools to deliver malware via malicious build scripts and project files. The campaign threatens the supply chain, particularly cybersecurity professionals, game developers, and DevOps teams that rely on open source tooling.

  • 2 weeks ago | darkreading.com | Elizabeth Montalbano

    Google has fixed a security vulnerability in its page for recovering account details that allowed anyone to access the page and brute-force the private phone number of any user. The flaw posed a significant risk to Google users by exposing them to risk of phishing and other attacks. A security researcher who goes by the online name of Brutecat detailed on their website how the page for recovering one's password worked without JavaScript.

  • 2 weeks ago | urgentcomm.com | Elizabeth Montalbano

    Backdoors lurking in legitimate-looking code contain file-deletion commands that can destroy production systems and cause massive disruptions to software supply chains. Two malicious npm packages disguised as legitimate developer utilities on the npm registry contain backdoors that could wipe out entire production systems, posing a threat to the software supply chain.

Try JournoFinder For Free

Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.

Start Your 7-Day Free Trial →

X (formerly Twitter)

Followers
256
Tweets
451
DMs Open
No
EM
EM @lizoleeta
3 Mar 25

Pre-save my new single "All I Ever See (Basic Betty Version)" on Spotify: https://t.co/2pyTcpRGQA (powered by @distrokid)

EM
EM @lizoleeta
7 Jun 24

Super excited about the release of my new single "Let's Drink Coffee" distributed by @DistroKid and live on Spotify! https://t.co/p9vlLklKq5

EM
EM @lizoleeta
2 Jun 22

My latest post on Medium about four things I think we should prioritize to live a happier life, aptly titled: Focusing on These 4 Things Will Help You Achieve More Happiness in Life. :) Check it out and thanks for reading! https://t.co/iyf8Btuly8