News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Google names 97 observed zero-day vulnerabilities
B2B Cyber ​​Security ShortNews

There are many zero-day vulnerabilities, but not all of them are widely exploited. Google and Mandiant observed 97 zero-day vulnerabilities that were heavily exploited - an increase of 50 percent compared to the previous year. Google and Mandiant released a new study that observed 2023 zero-day vulnerabilities exploited in the wild in 97. That's over 50 percent more than in 2022 (62 vulnerabilities), but less than the record-breaking 106 vulnerabilities exploited in 2021. TAG and Mandiant were responsible for the original discovery of 29 of these…

Read more

Pig butchering scam with AI support
AI-assisted pig butchering scam - photo by Braňo on Unsplash

CryptoRom scammers are adding AI chat tools like ChatGPT and invented crypto account hacks to their toolbox. In its new report, Sophos explains the "pig butchering" scam. In addition, seven new fake apps for crypto investments have been successfully smuggled into the official stores. Sophos today released new findings on CryptoRom scams. This is a subset of so-called “pig butchering” (shā zhū pán) scams designed to trick dating app users into investing in fake cryptocurrency funds. AI Tools Refine Attack Techniques The report released today, “Sha Zhu Pan Scam Uses ChatGPT to Target…

Read more

Google Chrome: Update closes 20 vulnerabilities
B2B Cyber ​​Security ShortNews

Many highly dangerous vulnerabilities have again been found via Chrome's bug bounty program. The current Chrome update to version 115.0.5790.98/99 closes 20 vulnerabilities - 4 of which are classified as "highly dangerous" The current Chrome update contains a total of 20 updates, including 4 updates for highly dangerous vulnerabilities. In companies, the admins ensure that Chrome remains up to date. Individual companies and SMEs should definitely click in the help area - the further update happens automatically. Work PCs often run through and as long as the browser is not closed and reopened, no update happens! Chrome version 115.0.5790.98/99 closes gaps…

Read more

MSP: Mobile Security for Chromebooks, Android and iOS devices
MSP: Mobile Security for Chromebooks, Android and iOS devices

For MSPs, Malwarebytes launches Mobile Security for OneView. The new solution enables Managed Service Providers (MSPs) to protect Chromebooks, Android and iOS devices against the latest cyber threats such as ransomware and malicious apps. MSPs can now use the Malwarebytes OneView multi-tenant platform to manage their customers' mobile phones and tablets in addition to their servers, workstations and laptops. With real-time protection, MSPs can also prevent accidental access to malicious websites, block malicious apps and unwanted in-app ads, enabling a safer mobile experience for their customers. Mobile security breach: 45 percent…

Read more

ChatGPT Fake Apps: Expensive subscriptions for zero features
SophosNews

A Sophos report uncovers the rip-off through expensive ChatGPT imitations: The fraud apps continue to thrive due to gaps in the app store guidelines from the current interest in the latest version of the AI-supported language model and benefit with sometimes horrendous subscriptions. Fees . Sophos X-Ops has uncovered various apps on the official Apple and Google stores posing as legitimate ChatGPT-based chatbots, scamming users with obfuscated, often extortionate, fees, and raking in thousands of dollars a month for scammers. Fleeceware: Expensive apps with tons of advertising The report “FleeceGPT Mobile Apps Target…

Read more

iOS Extraction Toolkit 8 to extract iPhone and iPad
iOS Extraction Toolkit 8 to extract iPhone and iPad

ElcomSoft comes out with a major update of the mobile forensic extraction tool Elcomsoft iOS Forensic Toolkit to extract selected iPhone and iPad models. checkm8-based extraction process enables the most complete extraction, extracting all keychain records regardless of protection class and the entire file system content. The new version 8.0 offers repeatable, verifiable and forensically sound checkm8 extraction for a wide range of Apple devices and features an updated command line driven user interface. Additionally, full passcode unlocking is now available for select older Apple devices. A Mac edition of the tool is currently available, Linux and Windows editions will be available in…

Read more

Critical vulnerability in Apple devices
B2B Cyber ​​Security ShortNews

Apple recently released a software update for iOS and iPadOS 15.6.1 to fix a zero-day kernel vulnerability identified as CVE-2022-32917. This critical vulnerability in Apple devices allows code execution with kernel privileges. Lookout explains how. Apple is aware of a report mentioning active exploitation of the vulnerability in the wild. This vulnerability could allow a maliciously crafted application to execute arbitrary code with kernel privileges. This CVE could affect Apple iPhone, iPad and iPod Touch models, meaning anyone using one of these devices will have their device immediately…

Read more

Malware in business apps spies on Facebook accounts
B2B Cyber ​​Security ShortNews

According to Facebook, or rather its parent company Meta, it has found over 400 malware-infected Android and iOS apps in the Google and Apple stores. The apps should tap and forward Facebook access data. Interesting: Meta also found many malicious business or ad management apps. This year, Meta security researchers found more than 400 malicious Android and iOS apps designed to steal Facebook credentials and compromise people's accounts. These apps were listed in the Google Play Store and Apple's App Store and classified as games, VPN services, business apps...

Read more

Enterprise encryption solution with mobile client

Conpal LAN Crypt mobile Client 3.0 for iOS and Android offers secure external file sharing in its enterprise encryption solution. 2Go functionality facilitates mobile working with password-protected file exchange outside the organization. With version 3.0, Conpal is adding a significant functional extension to its enterprise encryption solution Conpal LAN Crypt for iOS and Android: With the "2Go" functionality, it is now possible for users to exchange files securely and password-protected with external contacts. Recipients can install the Conpal LAN Crypt app from the App or Play Store, with which they can decrypt the file, process it further and send it again....

Read more

iOS and Android: CryptoRom scammers are ruining unsuspecting users

A million-dollar game: CryptoRom fraudsters ruin unsuspecting users with sophisticated social engineering. The misuse of iOS TestFlight and WebClips in combination with social engineering and fake websites drives many of the victims to ruin. Sophos has a new report “CryptoRom Swindlers Continue to Target Vulnerable iPhone/Android Users” about the internationally widespread cryptocurrency scam CryptoRom. This scam targets iPhone and Android users using popular dating apps like Bumble and Tinder. As the report shows, victims' accounts were frozen as soon as they attempted to withdraw their investments from the fake platform. In addition, some of them…

Read more