Seclook App Icon

Today's News

6 Tips to Stay Motivated

2024-04-26 16:32:52 UTC

Keeper Security offers 6 tips to stay motivated and protect your organization against cyber threats with their Enterprise Password Management solution. They also provide options for sponsoring videos, pentests, security consulting, training, and certifications. Follow them on social media and consider supporting them on Patreon or with one-time donations. They also recommend essential hacker books and share details about their own equipment for those interested in building their own setups. (176 words)

Read More
Powerful ‘Brokewell’ Android Trojan Allows Attackers to Takeover Devices

2024-04-26 14:08:40 UTC

A newly discovered Android trojan called Brokewell has been found to steal user data and enable attackers to remotely control devices. This powerful malware poses a serious security threat to Android users.

Read More
Over 1,400 CrushFTP Instances Vulnerable to Exploited Zero-Day

2024-04-26 13:44:39 UTC

More than 1,400 CrushFTP servers are at risk due to an actively exploited zero-day vulnerability that has a published proof-of-concept (PoC). This news comes as a warning for users of these instances, as hackers may take advantage of the vulnerability. The post "Over 1,400 CrushFTP Instances Vulnerable to Exploited Zero-Day" emphasizes the urgency for these servers to address the security issue to prevent any unauthorized access.

Read More
Self-Spreading PlugX USB Drive Malware Plagues Over 90k IP Addresses

2024-04-26 13:41:29 UTC

A self-spreading PlugX malware, transmitted through infected USB drives, has affected over 90,000 IP addresses. The worm variant continues to plague systems, as reported by SecurityWeek.

Read More
Hackers Abuse Zero-Day Exploit for CrushFTP

2024-04-26 13:00:39 UTC

Hackers have been exploiting a zero-day vulnerability in CrushFTP, according to reports. To combat cybercrime, a tool called Flare can help track down shady sellers and manage threat intelligence. Interested individuals can sign up for a free trial to see what information is available. For those looking to learn more about cybersecurity, training with John Hammond is available at a pay-what-you-can price. Additionally, readers can explore "The Hacker Mindset" by Garret Gee. To stay updated on cybersecurity news and more, subscribe to the newsletter. Support for the channel is available through Patreon, and sponsorship opportunities are also offered. You can connect with the channel on various social media platforms or submit malware for analysis. To support the channel on YouTube, remember to like, comment, and subscribe.

Read More
The Good, the Bad and the Ugly in Cybersecurity – Week 17

2024-04-26 13:00:00 UTC

In cybersecurity news this week, the U.S. government has filed cases against spyware and crypto criminals, Ivanti zero-days were used to hack into MITRE networks, and the GRU has been found exploiting an old Windows flaw.

Read More
In Other News: China Hacked Volkswagen, DDoS Service Shutdown, Rubrik IPO

2024-04-26 12:00:00 UTC

China has targeted Volkswagen in a hacking incident, a DDoS service has been shut down, and Rubrik has had its IPO. These stories, which may have gone unnoticed, were highlighted by SecurityWeek.

Read More
Darktrace to be Taken Private in $5.3 Billion Sale to Thoma Bravo

2024-04-26 11:32:33 UTC

The UK cybersecurity firm Darktrace has announced it will be acquired by private equity firm Thoma Bravo in a $5.3 billion cash deal, taking the company private. The acquisition marks a significant move in the cybersecurity industry.

Read More
Long Article on GM Spying on Its Cars’ Drivers

2024-04-26 11:01:09 UTC

In a recent article by Kashmir Hill, it was revealed that GM deceived its drivers into unknowingly allowing the company to spy on them, ultimately selling that data to insurance companies. The scandal involving GM's manipulation of customer privacy has raised concerns and sparked debates on data privacy and ethical business practices.

Read More
10 Critical Endpoint Security Tips You Should Know

2024-04-26 10:46:00 UTC

According to recent findings from the IDC, 70% of successful breaches originate from unprotected endpoints, making them an attractive target for hackers in today's interconnected digital landscape. To safeguard businesses from devastating cyberattacks, here are 10 critical endpoint security tips that every IT professional should know.

Read More
New 'Brokewell' Android Malware Spread Through Fake Browser Updates

2024-04-26 10:42:00 UTC

A new Android malware named 'Brokewell' is spreading through fake browser updates, according to a report by Dutch security firm ThreatFabric. This malware has data-stealing and remote-control capabilities, making it a threat to mobile banking users. It is currently in active development.

Read More
The L.A. County Department of Health Services Breached

2024-04-26 10:40:43 UTC

The Los Angeles County Department of Health Services has been breached after a recent phishing attack targeted over twenty employees. This breach has exposed the personal and medical information of thousands of patients. As the second largest public health care system in the nation, the department runs public hospitals and clinics.

Read More
Palo Alto Networks Outlines Remediation for Critical PAN-OS Flaw Under Attack

2024-04-26 10:18:00 UTC

Palo Alto Networks has released instructions on how to fix a serious security flaw in PAN-OS that is currently being targeted by cyber criminals. The flaw, known as CVE-2024-3400, has a severity score of 10.0 and allows attackers to remotely execute commands on vulnerable devices without authentication. The company has addressed the issue and provided remediation guidance to help protect users.

Read More
Critical WordPress Automatic Plugin Vulnerability Exploited to Inject Backdoors

2024-04-26 09:34:50 UTC

A critical vulnerability in the WordPress Automatic plugin is currently being exploited by hackers to insert backdoors and web shells into websites. This security flaw has raised concerns among website owners, prompting urgent action to protect their online platforms.

Read More
Was the Fusion Drive a good idea?

2024-04-26 06:30:00 UTC

Apple's decision to implement Fusion Drives in their iMacs and Mac minis from late 2012 to 2021 is now being questioned. The combination of SSD and HDD was meant to provide a balance between speed and storage capacity, but the company has since phased out Fusion Drives. The effectiveness of this technology and the reasons for its discontinuation have left consumers wondering if it was truly a good idea.

Read More
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites

2024-04-26 05:49:00 UTC

Threat actors are currently targeting WordPress sites by exploiting a critical security flaw in the WP-Automatic plugin. This vulnerability, known as CVE-2024-27956, has a high CVSS score of 9.9 and could potentially lead to site takeovers. All versions of the plugin before 3.9.2.0 are affected by this SQL injection (SQLi) flaw.

Read More
Risky Biz News: Cisco zero-day fun time is here!

2024-04-25 23:03:05 UTC

In the latest episode of Risky Biz News, Catalin Cimpanu and Patrick Gray provide a brief update on recent security news, including Cisco zero-day vulnerabilities. The podcast is also available in newsletter format for those who prefer written updates.

Read More