News Gist .News

Articles | Politics | Finance | Stocks | Crypto | AI | Technology | Science | Gaming | PC Hardware | Laptops | Smartphones | Archive

Broadcom Releases Fixes for Multiple VMware Security Flaws

Broadcom has released patches for three critical vulnerabilities in its VMware products, which are already being exploited in the wild. The bugs were described as VM escape flaws and affect all supported versions of VMware ESX, vSphere, Cloud Foundation, and Telco Cloud Platform. These issues were deemed severe enough to warrant immediate attention from users, who are urged to apply the fixes as soon as possible.

See Also

Threat Posed by New VMware Hyperjacking Vulnerabilities Is Hard to Overstate Δ1.82

A recently discovered trio of vulnerabilities in VMware's virtual machine products can grant hackers unprecedented access to sensitive environments, putting entire networks at risk. If exploited, these vulnerabilities could allow a threat actor to escape the confines of one compromised virtual machine and access multiple customers' isolated environments, effectively breaking all security boundaries. The severity of this attack is compounded by the fact that VMware warned it has evidence suggesting the vulnerabilities are already being actively exploited in the wild.

Microsoft Discoveries Vulnerable Software Attack. Δ1.78

Microsoft has confirmed that its Windows drivers and software are being exploited by hackers through zero-day attacks, allowing them to escalate privileges and potentially drop ransomware on affected machines. The company patched five flaws in a kernel-level driver for Paragon Partition Manager, which were apparently found in BioNTdrv.sys, a piece of software used by the partition manager. Users are urged to apply updates as soon as possible to secure their systems.

Security Risks in Vscode Extensions Expose Millions of Users Δ1.76

Malicious code seems to have been introduced into two popular VSCode extensions, "Material Theme - Free" and "Material Theme Icons - Free", which have gained millions of downloads. Microsoft quickly pulled the extensions from its marketplace after finding malicious code hiding inside, but the original developers claim they were never consulted. The developer's harsh reaction has caused more harm than good, with many users potentially affected by the sudden removal of the extensions.

Huge Cyberattack Found Hitting Vulnerable Microsoft-Signed Legacy Drivers to Get Past Security Δ1.76

A massive cybercriminal campaign has been discovered utilizing outdated and vulnerable Windows drivers to deploy malware against hundreds of thousands of devices. The attackers leveraged a signed driver, allowing them to disable antivirus programs and gain control over infected machines. This campaign is believed to be linked to the financially motivated group Silver Fox, which is known for its use of Chinese public cloud servers.

Malware Hijacks Nearly 1 Million Windows Devices in Advanced Malvertising Attack Δ1.75

A broad overview of the four stages shows that nearly 1 million Windows devices were targeted by a sophisticated "malvertising" campaign, where malware was embedded in ads on popular streaming platforms. The malicious payload was hosted on platforms like GitHub and used Discord and Dropbox to spread, with infected devices losing login credentials, cryptocurrency, and other sensitive data. The attackers exploited browser files and cloud services like OneDrive to steal valuable information.

Researchers Uncover Unknown Android Flaws Used to Hack Into a Student's Phone Δ1.75

Amnesty International said that Google fixed previously unknown flaws in Android that allowed authorities to unlock phones using forensic tools. On Friday, Amnesty International published a report detailing a chain of three zero-day vulnerabilities developed by phone-unlocking company Cellebrite, which its researchers found after investigating the hack of a student protester’s phone in Serbia. The flaws were found in the core Linux USB kernel, meaning “the vulnerability is not limited to a particular device or vendor and could impact over a billion Android devices,” according to the report.

Software Bug at Firm Left NHS Data 'Vulnerable to Hackers' Δ1.74

The NHS is investigating claims that a software flaw at Medefer compromised patient data security, as the issue was discovered in November but may have existed for several years. Medefer has stated that no patient data breach occurred and that the flaw was promptly addressed, although cybersecurity experts have raised concerns about the company's response to the vulnerability. The situation underscores the critical importance of robust cybersecurity measures in handling sensitive medical information, especially within the healthcare sector.

Google Researchers Release Kit to Exploit Microcode Vulnerability in AMD CPUs Δ1.74

A team of Google researchers has identified a significant exploit, named "EntrySign," affecting AMD's Zen 1 through Zen 4 processors, which allows users with local admin privileges to push custom microcode updates. This vulnerability, while requiring high-level access to exploit, poses serious implications for security, as it enables users to manipulate CPU behavior and potentially weaken system protections. AMD has issued a BIOS patch to address the issue, but many CPUs remain vulnerable until updated, highlighting the ongoing challenges of CPU security management.

Microsoft Battles More Bugs in Windows 11 24h2 with New Round of Patches Δ1.73

Microsoft continues its quest to vanquish bugs from Windows 11 24H2, and the latest update seems to fix a number of them. Released this past Tuesday, KB5052093 is an optional update, which means you may have to wait for it to appear or manually download and install it if you're in a hurry. The new update improves performance and fixes several glitches that were plaguing users.

Thousands of Misconfigured Building Access Systems Have Been Leaked Online Δ1.73

Misconfigured Access Management Systems (AMS) connected to the internet pose a significant security risk to organizations worldwide. Vulnerabilities in these systems could allow unauthorized access to physical resources, sensitive employee data, and potentially even compromise critical infrastructure. The lack of response from affected organizations raises concerns about their readiness to mitigate potential risks.

Microsoft Warns of Chinese Hackers Targeting Cloud Apps to Steal Business Data Δ1.73

Microsoft's Threat Intelligence has identified a new tactic from Chinese threat actor Silk Typhoon towards targeting "common IT solutions" such as cloud applications and remote management tools in order to gain access to victim systems. The group has been observed attacking a wide range of sectors, including IT services and infrastructure, healthcare, legal services, defense, government agencies, and many more. By exploiting zero-day vulnerabilities in edge devices, Silk Typhoon has established itself as one of the Chinese threat actors with the "largest targeting footprints".

ClickFix Attack Hijacks Microsoft SharePoint to Spread Havoc Malware Δ1.73

Security researchers spotted a new ClickFix campaign that has been abusing Microsoft SharePoint to distribute the Havoc post-exploitation framework. The attack chain starts with a phishing email, carrying a "restricted notice" as an .HTML attachment, which prompts the victim to update their DNS cache manually and then runs a script that downloads the Havoc framework as a DLL file. Cybercriminals are exploiting Microsoft tools to bypass email security and target victims with advanced red teaming and adversary simulation capabilities.

Protecting Yourself From Vishing Attacks Surged 442% Last Year Δ1.72

Vishing attacks have skyrocketed, with CrowdStrike tracking at least six campaigns in which attackers pretended to be IT staffers to trick employees into sharing sensitive information. The security firm's 2025 Global Threat Report revealed a 442% increase in vishing attacks during the second half of 2024 compared to the first half. These attacks often use social engineering tactics, such as help desk social engineering and callback phishing, to gain remote access to computer systems.

Why Broadcom Stock Is Falling Today Δ1.72

Shares of semiconductor company Broadcom (NASDAQ: AVGO) plummeted after it was reported that the company is testing Intel's manufacturing chip process. Broadcom designs its chips but doesn't manufacture them, with most processors currently made by Taiwan Semiconductor Manufacturing (TSMC). The stock fell by as much as 4.2% today, largely due to investors' concerns about potential implications for chip production and AI development.

Microsoft Teams and Other Windows Tools Hijacked to Hack Corporate Networks Δ1.72

Hackers are exploiting Microsoft Teams and other legitimate Windows tools to launch sophisticated attacks on corporate networks, employing social engineering tactics to gain access to remote desktop solutions. Once inside, they sideload flawed .DLL files that enable the installation of BackConnect, a remote access tool that allows persistent control over compromised devices. This emerging threat highlights the urgent need for businesses to enhance their cybersecurity measures, particularly through employee education and the implementation of multi-factor authentication.

Lee Enterprises Ransomware Attack Hits Freelance and Contractor Payments Δ1.72

The Lee Enterprises ransomware attack is affecting the company's ability to pay outside vendors, including freelancers and contractors, as a result of the cyberattack that began on February 3. The attack has resulted in widescale outages and ongoing disruption at dozens of newspapers across the United States, causing delays to print editions and impacting various aspects of the company's operations. Lee Enterprises has confirmed that hackers "encrypted critical applications," including those related to vendor payments.

Salty Game Dev Comments, Easier Mods Inside Command & Conquer’s Source Code Δ1.72

With the right folks involved, EA can capably preserve and update its classics. The release of the source code has provided a wealth of information for modders and developers, showcasing the ingenuity and quirks of Windows game development from 1995 to 2003. This move paves the way for open-source reimplementations and community-driven projects, ensuring the longevity of beloved classic games.

Ransomware Dominates Cybersecurity Threats in 2024 Δ1.72

The modern-day cyber threat landscape has become increasingly crowded, with Advanced Persistent Threats (APTs) becoming a major concern for cybersecurity teams worldwide. Group-IB's recent research points to 2024 as a 'year of cybercriminal escalation', with a 10% rise in ransomware compared to the previous year, and a 22% rise in phishing attacks. The "Game-changing" role of AI is being used by both security teams and cybercriminals, but its maturity level is still not there yet.

Top Bluetooth Chip Security Flaw Could Put a Billion Devices at Risk Worldwide Δ1.72

A "hidden feature" was found in a Chinese-made Bluetooth chip that allows malicious actors to run arbitrary commands, unlock additional functionalities, and extract sensitive information from millions of Internet of Things (IoT) devices worldwide. The ESP32 chip's affordability and widespread use have made it a prime target for cyber threats, putting the personal data of billions of users at risk. Cybersecurity researchers Tarlogic discovered the vulnerability, which they claim could be used to obtain confidential information, spy on citizens and companies, and execute more sophisticated attacks.

BadBox Malware Hit After Infecting Over 500,000 Android Devices Δ1.71

Cybersecurity experts have successfully disrupted the BadBox 2.0 botnet, which had compromised over 500,000 low-cost Android devices by removing numerous malicious apps from the Play Store and sinkholing multiple communication domains. This malware, primarily affecting off-brand devices manufactured in mainland China, has been linked to various forms of cybercrime, including ad fraud and credential stuffing. Despite the disruption, the infected devices remain compromised, raising concerns about the broader implications for consumers using uncertified technology.

Firm Says AI-Assisted Security Analyzer Found 16 Bugs in OpenRISC CPU Core in Under 60 Seconds Δ1.71

Caspia Technologies has made a significant claim about its CODAx AI-assisted security linter, which has identified 16 security bugs in the OpenRISC CPU core in under 60 seconds. The tool uses a combination of machine learning algorithms and security rules to analyze processor designs for vulnerabilities. The discovery highlights the importance of design security and product assurance in the semiconductor industry.

Windows 11 24h2 Continues to Haunt Users with Bugs Δ1.71

Microsoft's latest Windows 11 24H2 update has been plagued by bugs, with several issues still causing problems for users despite multiple patches. The update enhances performance and introduces new features, but its reliability remains a concern. Several sets of patches have been rolled out so far, but the barrage of glitches continues to affect some users.

Advanced Cyber Threats on Network Devices Worry Global Internet Security Δ1.71

Sophisticated, advanced threats have been found lurking in the depths of the internet, compromising Cisco, ASUS, QNAP, and Synology devices. A previously-undocumented botnet, named PolarEdge, has been expanding around the world for more than a year, targeting a range of network devices. The botnet's goal is unknown at this time, but experts have warned that it poses a significant threat to global internet security.

AWS Misconfigurations Reportedly Used to Launch Phishing Attacks Δ1.71

Threat actors are exploiting misconfigured Amazon Web Services (AWS) environments to bypass email security and launch phishing campaigns that land in people's inboxes. Cybersecurity researchers have identified a group using this tactic, known as JavaGhost, which has been active since 2019 and has evolved its tactics to evade detection. The attackers use AWS access keys to gain initial access to the environment and set up temporary accounts to send phishing emails that bypass email protections.