
Elizabeth Montalbano
Writer at Freelance
Journalist, writer, photographer, therapist, surfer and musician. BA/English, MFA/Creative Writing
Articles
-
1 week ago |
darkreading.com | Elizabeth Montalbano
The GodFather Android banking Trojan has evolved significantly, with an advanced on-device virtualization technique targeting financial institutions in Turkey, which allows it to hijack legitimate mobile banking and cryptocurrency applications more deceptively than ever. The method creates a complete, isolated virtual environment on the victim's mobile device by installing a malicious "host" application containing a virtualization framework, researchers from Zimperium zLabs have discovered.
-
1 week ago |
darkreading.com | Elizabeth Montalbano
Attackers are actively targeting a critical flaw in a popular Python-based Web app for building AI agents and workflows to unleash a powerful botnet that can cause full system compromise, distributed denial-of-service (DDoS) attacks, and potential loss or exposure of sensitive information hosted on affected servers.
-
1 week ago |
darkreading.com | Elizabeth Montalbano
A newly identified threat group has weaponized GitHub repositories offering what appear to be legitimate pen-testing and other security tools to deliver malware via malicious build scripts and project files. The campaign threatens the supply chain, particularly cybersecurity professionals, game developers, and DevOps teams that rely on open source tooling.
-
2 weeks ago |
darkreading.com | Elizabeth Montalbano
Google has fixed a security vulnerability in its page for recovering account details that allowed anyone to access the page and brute-force the private phone number of any user. The flaw posed a significant risk to Google users by exposing them to risk of phishing and other attacks. A security researcher who goes by the online name of Brutecat detailed on their website how the page for recovering one's password worked without JavaScript.
-
2 weeks ago |
urgentcomm.com | Elizabeth Montalbano
Backdoors lurking in legitimate-looking code contain file-deletion commands that can destroy production systems and cause massive disruptions to software supply chains. Two malicious npm packages disguised as legitimate developer utilities on the npm registry contain backdoors that could wipe out entire production systems, posing a threat to the software supply chain.
Try JournoFinder For Free
Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.
Start Your 7-Day Free Trial →X (formerly Twitter)
- Followers
- 256
- Tweets
- 451
- DMs Open
- No

Pre-save my new single "All I Ever See (Basic Betty Version)" on Spotify: https://t.co/2pyTcpRGQA (powered by @distrokid)

Super excited about the release of my new single "Let's Drink Coffee" distributed by @DistroKid and live on Spotify! https://t.co/p9vlLklKq5

My latest post on Medium about four things I think we should prioritize to live a happier life, aptly titled: Focusing on These 4 Things Will Help You Achieve More Happiness in Life. :) Check it out and thanks for reading! https://t.co/iyf8Btuly8