⚠️ Hackers are getting faster! Magnet Goblin, a threat group known for fast exploitation of 1-day vulnerabilities, targets edge devices & public servers to deploy #malware like Nerbian RAT.
rooting and changing the OS of smart anything, especially phones, need to be at the center of the right to repair movement, not just getting access to software drivers or hardware.
PS: i have avoided activating the Roku nonsense exactly for what the article describes.
@blogdiva This all #marketing and #profit bullshit. These huge “smart” TVs are so cheap, but that’s only because they’re burdened with #malware and #spyware. Try pricing a “dumb” display at that size.
Then you realize this is like an ISP renting you their hardware at a discount or charging you four times more every month to bring your own. There’s a reason they want their device in your home and it’s not a benefit to you. So they create financial #incentive give to make you do it. #RESIST!
Threat actors used QEMU emulator to create stealthy network tunnels during a recent #cyberattack, bypassing traditional security defenses with sophisticated tactics.
:python: Lazarus Exploits Typos to Sneak PyPI #Malware into #Dev Systems:
The notorious #NorthKorea'n state-backed hacking group Lazarus uploaded four packages to the #Python Package Index (#PyPI) repository with the goal of infecting #develop'er systems with malware.
#Cybersecurity#AI#GenerativeAI#Malware#AIWorms: "As generative AI systems like OpenAI's ChatGPT and Google's Gemini become more advanced, they are increasingly being put to work. Startups and tech companies are building AI agents and ecosystems on top of the systems that can complete boring chores for you: think automatically making calendar bookings and potentially buying products. But as the tools are given more freedom, it also increases the potential ways they can be attacked.
Now, in a demonstration of the risks of connected, autonomous AI ecosystems, a group of researchers has created one of what they claim are the first generative AI worms—which can spread from one system to another, potentially stealing data or deploying malware in the process. “It basically means that now you have the ability to conduct or to perform a new kind of cyberattack that hasn't been seen before,” says Ben Nassi, a Cornell Tech researcher behind the research."
Security researchers at Palo Alto Networks have uncovered a new variant of the notorious Bifrost malware, now targeting Linux systems with a cunning twist.
@AAKL@thehackernews Well, here we go again.
Once more: Bifrose is NOT, repeat NOT, a #Linux#malware in the sense that it exploits a vulnerability in Linux. Bifrose is distributed various ways but it must be installed manually! The source says "Once installed on a victim's computer, Bifrost allows ..."
But HOW is it installed in the first place? That needs an "evil maid" and/or severe administration shortcomings. A Linux that is run according best practice is immune against Bifrose & Co.
rule (lemmy.ml)