News Gist .News

Articles | Politics | Finance | Stocks | Crypto | AI | Technology | Science | Gaming | PC Hardware | Laptops | Smartphones | Archive

Advanced Cyber Threats on Network Devices Worry Global Internet Security

Sophisticated, advanced threats have been found lurking in the depths of the internet, compromising Cisco, ASUS, QNAP, and Synology devices. A previously-undocumented botnet, named PolarEdge, has been expanding around the world for more than a year, targeting a range of network devices. The botnet's goal is unknown at this time, but experts have warned that it poses a significant threat to global internet security.

See Also

Ransomware Dominates Cybersecurity Threats in 2024 Δ1.80

The modern-day cyber threat landscape has become increasingly crowded, with Advanced Persistent Threats (APTs) becoming a major concern for cybersecurity teams worldwide. Group-IB's recent research points to 2024 as a 'year of cybercriminal escalation', with a 10% rise in ransomware compared to the previous year, and a 22% rise in phishing attacks. The "Game-changing" role of AI is being used by both security teams and cybercriminals, but its maturity level is still not there yet.

Malware Botnet Spreads Across 1.6 Million Android Tvs Δ1.78

The Vo1d botnet has infected over 1.6 million Android TVs, with its size fluctuating daily. The malware, designed as an anonymous proxy, redirects criminal traffic and blends it with legitimate consumer traffic. Researchers warn that Android TV users should check their installed apps, scan for suspicious activity, and perform a factory reset to clean up the device.

Top Bluetooth Chip Security Flaw Could Put a Billion Devices at Risk Worldwide Δ1.78

A "hidden feature" was found in a Chinese-made Bluetooth chip that allows malicious actors to run arbitrary commands, unlock additional functionalities, and extract sensitive information from millions of Internet of Things (IoT) devices worldwide. The ESP32 chip's affordability and widespread use have made it a prime target for cyber threats, putting the personal data of billions of users at risk. Cybersecurity researchers Tarlogic discovered the vulnerability, which they claim could be used to obtain confidential information, spy on citizens and companies, and execute more sophisticated attacks.

Microsoft Warns of Chinese Hackers Targeting Cloud Apps to Steal Business Data Δ1.77

Microsoft's Threat Intelligence has identified a new tactic from Chinese threat actor Silk Typhoon towards targeting "common IT solutions" such as cloud applications and remote management tools in order to gain access to victim systems. The group has been observed attacking a wide range of sectors, including IT services and infrastructure, healthcare, legal services, defense, government agencies, and many more. By exploiting zero-day vulnerabilities in edge devices, Silk Typhoon has established itself as one of the Chinese threat actors with the "largest targeting footprints".

BadBox Malware Hit After Infecting Over 500,000 Android Devices Δ1.76

Cybersecurity experts have successfully disrupted the BadBox 2.0 botnet, which had compromised over 500,000 low-cost Android devices by removing numerous malicious apps from the Play Store and sinkholing multiple communication domains. This malware, primarily affecting off-brand devices manufactured in mainland China, has been linked to various forms of cybercrime, including ad fraud and credential stuffing. Despite the disruption, the infected devices remain compromised, raising concerns about the broader implications for consumers using uncertified technology.

The Cybersecurity Industry Is Set for Explosive Growth as Global Threats Reach New Heights Δ1.76

The cybersecurity industry is poised for significant expansion, driven by increasing cyber threats, cloud computing adoption, and artificial intelligence (AI) integration in security measures. The global market is expected to grow from $172.24 billion in 2023 to $562.72 billion by 2032, reflecting a compound annual growth rate (CAGR) of approximately 14.3%. As cybersecurity spending continues to accelerate, businesses and governments are investing heavily in robust security defenses.

Malware Hijacks Nearly 1 Million Windows Devices in Advanced Malvertising Attack Δ1.76

A broad overview of the four stages shows that nearly 1 million Windows devices were targeted by a sophisticated "malvertising" campaign, where malware was embedded in ads on popular streaming platforms. The malicious payload was hosted on platforms like GitHub and used Discord and Dropbox to spread, with infected devices losing login credentials, cryptocurrency, and other sensitive data. The attackers exploited browser files and cloud services like OneDrive to steal valuable information.

How Much of Your Work Is Done in Your Browser? And Is that Browser Truly Secure? Δ1.76

NordLayer's new security-focused browser is set to address the growing concerns of enterprise businesses regarding online security, aiming to provide a unified solution with enhanced security measures, data loss prevention, and support for business growth. The browser's key features include Zero Trust Network Access (ZTNA) and Secure Web Gateway (SWG), allowing CISOs and security teams to control security settings in real-time. By implementing this solution, companies can protect themselves from various cyber threats, including phishing attacks, malware infiltration, and unauthorized data sharing.

Huge Cyberattack Found Hitting Vulnerable Microsoft-Signed Legacy Drivers to Get Past Security Δ1.76

A massive cybercriminal campaign has been discovered utilizing outdated and vulnerable Windows drivers to deploy malware against hundreds of thousands of devices. The attackers leveraged a signed driver, allowing them to disable antivirus programs and gain control over infected machines. This campaign is believed to be linked to the financially motivated group Silver Fox, which is known for its use of Chinese public cloud servers.

Web DDoS Attacks See Major Surge as AI Allows More Powerful Attacks Δ1.75

Layer 7 Web DDoS attacks have surged by 550% in 2024, driven by the increasing accessibility of AI tools that enable even novice hackers to launch complex campaigns. Financial institutions and transportation services reported an almost 400% increase in DDoS attack volume, with the EMEA region bearing the brunt of these incidents. The evolving threat landscape necessitates more dynamic defense strategies as organizations struggle to differentiate between legitimate and malicious traffic.

Tech Giant Google Discloses Scale of AI-Generated Terrorism Content Complaints Δ1.75

Google has informed Australian authorities it received more than 250 complaints globally over nearly a year that its artificial intelligence software was used to make deepfake terrorism material, highlighting the growing concern about AI-generated harm. The tech giant also reported dozens of user reports warning about its AI program Gemini being used to create child abuse material. The disclosures underscore the need for better guardrails around AI technology to prevent such misuse.

Businesses Are Worried About AI Use in Cyberattacks Δ1.75

Artificial Intelligence (AI) is increasingly used by cyberattackers, with 78% of IT executives fearing these threats, up 5% from 2024. However, businesses are not unprepared, as almost two-thirds of respondents said they are "adequately prepared" to defend against AI-powered threats. Despite this, a shortage of personnel and talent in the field is hindering efforts to keep up with the evolving threat landscape.

New Spyware Found to Be Snooping on Thousands of Android and Ios Users Δ1.75

A recent discovery has revealed that Spyzie, another stalkerware app similar to Cocospy and Spyic, is leaking sensitive data of millions of people without their knowledge or consent. The researcher behind the finding claims that exploiting these flaws is "quite simple" and that they haven't been addressed yet. This highlights the ongoing threat posed by spyware apps, which are often marketed as legitimate monitoring tools but operate in a grey zone.

Spyzie Stalkerware Exposes Half a Million Android and Iphone Users Δ1.75

A little-known phone surveillance operation called Spyzie has compromised more than half a million Android devices and thousands of iPhones and iPads, according to data shared by a security researcher. Most of the affected device owners are likely unaware that their phone data has been compromised. The bug allows anyone to access the phone data, including messages, photos, and location data, exfiltrated from any device compromised by Spyzie.

Protecting Yourself From Vishing Attacks Surged 442% Last Year Δ1.75

Vishing attacks have skyrocketed, with CrowdStrike tracking at least six campaigns in which attackers pretended to be IT staffers to trick employees into sharing sensitive information. The security firm's 2025 Global Threat Report revealed a 442% increase in vishing attacks during the second half of 2024 compared to the first half. These attacks often use social engineering tactics, such as help desk social engineering and callback phishing, to gain remote access to computer systems.

The Cybersecurity Threat Landscape Becomes Increasingly Elusive Δ1.75

A cyber-attack like the one in Zero Day is improbable. The average Netflix viewer isn’t familiar with the technical details of how cyberattacks are carried out, but they’re acutely aware of their growing frequency and severity. Millions of Americans have had their data exposed in attacks, and while they may not fully understand what ransomware is, they know it isn’t good. While the critical reception of Zero Day remains to be seen, one thing is certain: viewers will debate the plausibility of the events unfolding on their screens.

Researchers Uncover Unknown Android Flaws Used to Hack Into a Student's Phone Δ1.75

Amnesty International said that Google fixed previously unknown flaws in Android that allowed authorities to unlock phones using forensic tools. On Friday, Amnesty International published a report detailing a chain of three zero-day vulnerabilities developed by phone-unlocking company Cellebrite, which its researchers found after investigating the hack of a student protester’s phone in Serbia. The flaws were found in the core Linux USB kernel, meaning “the vulnerability is not limited to a particular device or vendor and could impact over a billion Android devices,” according to the report.

Network Blocking Is Never Going to Be the Solution Δ1.75

Cloudflare has slammed anti-piracy tactics in Europe, warning that network blocking is never going to be the solution. The leading DNS server provider suggests that any type of internet block should be viewed as censorship and calls for more transparency and accountability. Those who have been targeted by blocking orders and lawsuits, including French, Spanish, and Italian authorities, warn that such measures lead to disproportionate overblocking incidents while undermining people's internet freedom.

Microsoft Teams and Other Windows Tools Hijacked to Hack Corporate Networks Δ1.75

Hackers are exploiting Microsoft Teams and other legitimate Windows tools to launch sophisticated attacks on corporate networks, employing social engineering tactics to gain access to remote desktop solutions. Once inside, they sideload flawed .DLL files that enable the installation of BackConnect, a remote access tool that allows persistent control over compromised devices. This emerging threat highlights the urgent need for businesses to enhance their cybersecurity measures, particularly through employee education and the implementation of multi-factor authentication.

US Lawmakers Press Chinese Telecoms Over Ties to Military, Government Δ1.74

US lawmakers have raised national security concerns in letters to top Chinese telecom companies, China Mobile, China Telecom, and China Unicom, citing the potential for these firms to exploit access to American data through their U.S. cloud and internet businesses. The lawmakers are seeking details on any links between the companies and the Chinese military and government by March 31, amid concerns about unauthorized data access, espionage, or sabotage. National security experts have warned that China Telecom's operations in the US could pose a significant risk to American telecommunications networks.

Api Security Risks Plague Businesses Everywhere Δ1.74

Businesses are being plagued by API security risks, with nearly 99% affected. Report warns vulnerabilities, data exposure, and API authentication weaknesses are key issues that are causing trouble for businesses everywhere. Businesses can mitigate API risks before they can be exploited, researchers are saying.

More Reports Claim 2024 Was the Worst Year for Ransomware Attacks Yet. Δ1.74

2024 has been marked as a record-breaking year for ransomware attacks, with a 65% increase in detected groups and 44 new malware variants contributing to almost a third of undisclosed attacks. The healthcare, government, and education sectors were disproportionately affected, while emerging groups like LockBit and RansomHub accounted for a significant number of incidents, highlighting the growing sophistication of cybercriminals. As organizations face escalating financial and reputational risks, the need for proactive cybersecurity measures has never been more urgent.

Norton 360 Genie Scam Protection Δ1.74

The new Genie Scam Protection feature leverages AI to spot scams that readers might think are real. This helps avoid embarrassing losses of money and personal information when reading text messages, enticing offers, and surfing the web. Norton has added this advanced technology to all its Norton 360 security software products, providing users with a safer online experience.

Threat Posed by New VMware Hyperjacking Vulnerabilities Is Hard to Overstate Δ1.74

A recently discovered trio of vulnerabilities in VMware's virtual machine products can grant hackers unprecedented access to sensitive environments, putting entire networks at risk. If exploited, these vulnerabilities could allow a threat actor to escape the confines of one compromised virtual machine and access multiple customers' isolated environments, effectively breaking all security boundaries. The severity of this attack is compounded by the fact that VMware warned it has evidence suggesting the vulnerabilities are already being actively exploited in the wild.

Fortifying the UK’s Energy Sector: The Cybersecurity Imperative in an AI-Driven Future. Δ1.74

The UK's push to advance its position as a global leader in AI is placing increasing pressure on its energy sector, which has become a critical target for cyber threats. As the country seeks to integrate AI into every aspect of its life, it must also fortify its defenses against increasingly sophisticated cyberattacks that could disrupt its energy grid and national security. The cost of a data breach in the energy sector is staggering, with the average loss estimated at $5.29 million, and the consequences of a successful attack could be far more severe.