A zero-day vulnerability in WinRAR, a popular Windows shareware archiving tool, is being used by cybercriminals to steal traders’ funds. In June, cybersecurity firm Group-IB discovered the WinRAR ZIP file processing vulnerability. Hackers can hide malicious scripts in archive files disguised as “.jpg” images or “.txt” files to compromise target …
Read More »The Netflix interactive story game for ‘Love is Blind’ fans
Netflix released a mobile game that “Love is Blind” fans will want. Netflix Stories is an upcoming interactive fiction story game that lets players explore popular Netflix movies and shows. Netflix Stories: Love is Blind, the app’s first game, simulates a social experiment where singles try to find love before …
Read More »Threads launches its anticipated web app
Instagram Threads will launch one of its most requested features today: web access while logged in. The company says Threads users can post, view their feed, and interact with posts from the desktop at launch, but the experience won’t be identical to the mobile app. Web users cannot edit their …
Read More »X will hide news headlines for ‘improved aesthetics’
Elon Musk’s X, formerly Twitter, will display news links without headlines or descriptions. Fortune reports that the social network will display only the link and header image in posts. Musk said he made the decision “directly” in a Monday post. He said the change would “greatly improve the aesthetics.” This …
Read More »Tesla claims insiders caused 75,000 employee data breach
Tesla blamed insider wrongdoing for a data breach that affected over 75,000 employees. Tesla, owned by Elon Musk, filed a data breach notice with Maine‘s attorney general after an investigation found that two former employees leaked over 75,000 personal data to a foreign media outlet. In the notice, Tesla data …
Read More »Cellebrite asks police to keep phone hacking tech a secret
Cellebrite phone hacking technology has been used by police and other government agencies worldwide for years to unlock phones and steal data. The company has been careful to use its technology secretly. Has learned that Cellebrite requires users to keep its tech and use of it secret as part of …
Read More »First spacecraft reconnaissance mission for True Anomaly approved by regulators
True Anomaly, a defense-focused space technology startup, received regulatory permits to demonstrate imaging and rendezvous on-orbit for the first time. The NOAA and FCC authorizations allow the company to perform non-Earth imaging and demonstrate in-space rendezvous proximity operations. In a mission early next year, True Anomaly will use two Jackals …
Read More »CISA claims hackers are exploiting a new Citrix ShareFile file transfer bug
The U.S. cybersecurity agency warned that hackers are exploiting a new vulnerability in another enterprise file transfer software. CISA added Citrix ShareFile vulnerability CVE-2023-24489 to its KEV catalog on Wednesday. The flaw poses “significant risks to the federal enterprise,” and the agency ordered federal civilian executive branch agencies, including CISA, …
Read More »Cyber agencies in the US and Australia warn that IDOR security flaws can be exploited “at scale”
U.S. and Australian government cybersecurity agencies warn that common security vulnerabilities in websites and web apps can be exploited to commit large-scale data breaches. CISA, the National Security Agency, and the Australian Cyber Security Centre warned Thursday that insecure direct object references (IDORs) allow hackers to access or modify sensitive …
Read More »A study found that Facebook Pages and Groups create ideological echo chambers
New research published Thursday provides an unprecedented look at political behavior on Facebook and Instagram, two major online platforms where people express and discuss their political views. Four Science and Nature papers by an interdisciplinary team of researchers and Meta internal groups examined behavior on both platforms around the 2020 …
Read More »