Security researchers at Proofpoint are calling attention to the discovery of a commercial red-teaming tool called Nighthawk, warning that the command-and-control framework is likely to be abused by threat actors.
Google Ready to Roll Out Android Privacy Sandbox in Beta
Google this week announced plans to roll out Android Privacy Sandbox in beta starting early next year, delivering a more private advertising experience to mobile users.
Chinese Spyware Targets Uyghurs Through Apps: Report
Cybersecurity researchers said they have found evidence of Chinese spyware in Uyghur-language apps that can track the location and harvest the data of Uyghurs living in China and abroad.
Google Pays $70k for Android Lock Screen Bypass
Google recently handed out a $70,000 bug bounty reward for an Android vulnerability leading to lock screen bypass, security researcher David Schutz says.
Google Reveals Spyware Vendor’s Use of Samsung Phone Zero-Day Exploits
Google Project Zero has disclosed the details of three Samsung phone vulnerabilities that have been exploited by a spyware vendor since when they still had a zero-day status.
Calls for UK to Probe Reported Hacking of Liz Truss’s Phone
UK opposition politicians called for an investigation Saturday after a newspaper reported that suspected Kremlin agents had hacked ex-Prime Minister Liz Truss’s cell phone when she was foreign minister.
Apple Fixes Exploited Zero-Day With iOS 16.1 Patch
Apple on Monday shipped a major iOS update with fixes at least 20 documented security defects, including a kernel flaw that’s already being actively exploited in the wild.
Zoom for macOS Contains High-Risk Security Flaw
Video messaging technology powerhouse Zoom has rolled out a high-priority patch for macOS users alongside a warning that hackers could abuse the software flaw to connect to and control Zoom Apps.
Google Brings Passkey Support to Android and Chrome
Google on Wednesday announced the introduction of passkey support in Android and Chrome, to protect users from credential leaks and phishing attacks.
Meant to replace passwords, passkeys rely on biometric verification for authentication. They can be synced on multiple devices, cannot be reused and, unlike passwords, cannot be leaked.
Microsoft Warns of New Zero-Day; No Fix Yet For Exploited Exchange Server Flaws
Microsoft on Tuesday released software fixes to address more than 90 security defects affecting products in the Windows ecosystem and warned that one of the vulnerabilities was already being exploited as zero-day in the wild.