News Gist .News

Articles | Politics | Finance | Stocks | Crypto | AI | Technology | Science | Gaming | PC Hardware | Laptops | Smartphones | Archive

Eight Sleep Beds Seemingly Suffer From Serious Security Liabilities

High-tech Eight Sleep pods allow Elon Musk and DOGE staff to rest at work, but security flaws have been discovered, including an AWS key and remote access. Hackers could exploit the beds to infiltrate home networks and connected devices, raising concerns about personal privacy and entire home network security. The company's lack of oversight has allowed unauthorized access, potentially leading to financial losses and compromised data.

See Also

Researchers Uncover Unknown Android Flaws Used to Hack Into a Student's Phone Δ1.74

Amnesty International said that Google fixed previously unknown flaws in Android that allowed authorities to unlock phones using forensic tools. On Friday, Amnesty International published a report detailing a chain of three zero-day vulnerabilities developed by phone-unlocking company Cellebrite, which its researchers found after investigating the hack of a student protester’s phone in Serbia. The flaws were found in the core Linux USB kernel, meaning “the vulnerability is not limited to a particular device or vendor and could impact over a billion Android devices,” according to the report.

Top Bluetooth Chip Security Flaw Could Put a Billion Devices at Risk Worldwide Δ1.73

A "hidden feature" was found in a Chinese-made Bluetooth chip that allows malicious actors to run arbitrary commands, unlock additional functionalities, and extract sensitive information from millions of Internet of Things (IoT) devices worldwide. The ESP32 chip's affordability and widespread use have made it a prime target for cyber threats, putting the personal data of billions of users at risk. Cybersecurity researchers Tarlogic discovered the vulnerability, which they claim could be used to obtain confidential information, spy on citizens and companies, and execute more sophisticated attacks.

Malware Hijacks Nearly 1 Million Windows Devices in Advanced Malvertising Attack Δ1.73

A broad overview of the four stages shows that nearly 1 million Windows devices were targeted by a sophisticated "malvertising" campaign, where malware was embedded in ads on popular streaming platforms. The malicious payload was hosted on platforms like GitHub and used Discord and Dropbox to spread, with infected devices losing login credentials, cryptocurrency, and other sensitive data. The attackers exploited browser files and cloud services like OneDrive to steal valuable information.

Microsoft Warns of Chinese Hackers Targeting Cloud Apps to Steal Business Data Δ1.73

Microsoft's Threat Intelligence has identified a new tactic from Chinese threat actor Silk Typhoon towards targeting "common IT solutions" such as cloud applications and remote management tools in order to gain access to victim systems. The group has been observed attacking a wide range of sectors, including IT services and infrastructure, healthcare, legal services, defense, government agencies, and many more. By exploiting zero-day vulnerabilities in edge devices, Silk Typhoon has established itself as one of the Chinese threat actors with the "largest targeting footprints".

New Spyware Found to Be Snooping on Thousands of Android and Ios Users Δ1.73

A recent discovery has revealed that Spyzie, another stalkerware app similar to Cocospy and Spyic, is leaking sensitive data of millions of people without their knowledge or consent. The researcher behind the finding claims that exploiting these flaws is "quite simple" and that they haven't been addressed yet. This highlights the ongoing threat posed by spyware apps, which are often marketed as legitimate monitoring tools but operate in a grey zone.

Spyzie Stalkerware Exposes Half a Million Android and Iphone Users Δ1.72

A little-known phone surveillance operation called Spyzie has compromised more than half a million Android devices and thousands of iPhones and iPads, according to data shared by a security researcher. Most of the affected device owners are likely unaware that their phone data has been compromised. The bug allows anyone to access the phone data, including messages, photos, and location data, exfiltrated from any device compromised by Spyzie.

The Rise of Smart Earplugs for Better Sleep Δ1.72

Loop's $50 Dream earplugs are among the most comfortable I've worn, virtually eliminating outside noise to help me sleep. The earbuds made street disturbances sound distant and, when fitted right, get you close to silence as you fall asleep. Finding the right fit and securing them properly takes some trial and error.

Hackers Stole Engineer's Password Manager Database: A Nightmare Scenario Δ1.72

A software engineer for the Disney Company unwittingly downloaded malware on his computer that turned his life upside down. The malware gave outside attackers full access to his 1Password database and session cookies, allowing them to compromise his online accounts, including his employer's Slack channel. As a result, he lost his job after Disney's forensic examination reportedly showed that he had accessed pornographic material on his work laptop in violation of company policy.

Microsoft Discoveries Vulnerable Software Attack. Δ1.72

Microsoft has confirmed that its Windows drivers and software are being exploited by hackers through zero-day attacks, allowing them to escalate privileges and potentially drop ransomware on affected machines. The company patched five flaws in a kernel-level driver for Paragon Partition Manager, which were apparently found in BioNTdrv.sys, a piece of software used by the partition manager. Users are urged to apply updates as soon as possible to secure their systems.

Microsoft Teams and Other Windows Tools Hijacked to Hack Corporate Networks Δ1.72

Hackers are exploiting Microsoft Teams and other legitimate Windows tools to launch sophisticated attacks on corporate networks, employing social engineering tactics to gain access to remote desktop solutions. Once inside, they sideload flawed .DLL files that enable the installation of BackConnect, a remote access tool that allows persistent control over compromised devices. This emerging threat highlights the urgent need for businesses to enhance their cybersecurity measures, particularly through employee education and the implementation of multi-factor authentication.

Human Rights Abused: Governments Exploit Vulnerabilities to Silence Critics Δ1.72

Amnesty International has uncovered evidence that a zero-day exploit sold by Cellebrite was used to compromise the phone of a Serbian student who had been critical of the government, highlighting a campaign of surveillance and repression. The organization's report sheds light on the pervasive use of spyware by authorities in Serbia, which has sparked international condemnation. The incident demonstrates how governments are exploiting vulnerabilities in devices to silence critics and undermine human rights.

Elon Musk Fact Checks Debunks Claims Δ1.71

Joe Rogan recently pushed back against Elon Musk's claims about Social Security fraud, calling them misleading. On a recent episode of “The Joe Rogan Experience,” he and guest Mike Baker discussed Musk's assertion that millions of dead Americans are receiving Social Security benefits due to outdated database defaults. Social Security experts quickly dismissed the claims, pointing out that the numbers were exaggerated and that COBOL misinterpretation was a more likely explanation.

Thousands of Misconfigured Building Access Systems Have Been Leaked Online Δ1.71

Misconfigured Access Management Systems (AMS) connected to the internet pose a significant security risk to organizations worldwide. Vulnerabilities in these systems could allow unauthorized access to physical resources, sensitive employee data, and potentially even compromise critical infrastructure. The lack of response from affected organizations raises concerns about their readiness to mitigate potential risks.

Hackers Can Track Any Bluetooth Device Using a New Exploit Δ1.71

A new exploit can track any Bluetooth device using Apple's Find My network, allowing hackers to locate almost any Bluetooth-enabled device's location without its owner knowing. The attack can be done remotely in just a few minutes, and researchers have found that their method had a 90% success rate. This vulnerability could allow scammers to track devices remotely, potentially leading to identity theft or further malicious activities.

5 Easy Browser Tweaks That Secure Your Web Surfing Δ1.71

Modern web browsers offer several built-in settings that can significantly enhance data security and privacy while online. Key adjustments, such as enabling two-factor authentication, disabling the saving of sensitive data, and using encrypted DNS requests, can help users safeguard their personal information from potential threats. Additionally, leveraging the Tor network with specific configurations can further anonymize web browsing, although it may come with performance trade-offs.

What Elon Musk’s Critics Are Getting Wrong. Δ1.71

Elon Musk’s role in the government efficiency commission, known as DOGE, has been misconstrued as merely a vehicle for his financial gain, despite evidence suggesting it has led to a decline in his wealth. Critics argue that Musk's collaboration with Trump aims to dismantle government services for personal financial benefit, yet his substantial losses in Tesla's stock value indicate otherwise. This situation highlights the complexities of Musk's motivations and the potential risks his political alignment poses for his primary business interests.

Hacked, Leaked, Exposed: Why You Should Never Use Stalkerware Apps Δ1.71

Stalkerware apps are notoriously creepy, unethical, and potentially illegal, putting users' data and loved ones at risk. These companies, often marketed to jealous partners, have seen multiple app makers lose huge amounts of sensitive data in recent years. At least 24 stalkerware companies have been hacked or leaked customer data online since 2017.

Apple Refuses to Break Encryption, Seeks Reversal of UK Demand for Backdoor Δ1.70

Apple's appeal to the Investigatory Powers Tribunal may set a significant precedent regarding the limits of government overreach into technology companies' operations. The company argues that the UK government's power to issue Technical Capability Notices would compromise user data security and undermine global cooperation against cyber threats. Apple's move is likely to be closely watched by other tech firms facing similar demands for backdoors.

Advanced Cyber Threats on Network Devices Worry Global Internet Security Δ1.70

Sophisticated, advanced threats have been found lurking in the depths of the internet, compromising Cisco, ASUS, QNAP, and Synology devices. A previously-undocumented botnet, named PolarEdge, has been expanding around the world for more than a year, targeting a range of network devices. The botnet's goal is unknown at this time, but experts have warned that it poses a significant threat to global internet security.

Huge Cyberattack Found Hitting Vulnerable Microsoft-Signed Legacy Drivers to Get Past Security Δ1.70

A massive cybercriminal campaign has been discovered utilizing outdated and vulnerable Windows drivers to deploy malware against hundreds of thousands of devices. The attackers leveraged a signed driver, allowing them to disable antivirus programs and gain control over infected machines. This campaign is believed to be linked to the financially motivated group Silver Fox, which is known for its use of Chinese public cloud servers.

Doge in Crosshairs as Judges Weigh In Δ1.70

U.S. District Judge John Bates has ruled that government employee unions may question Trump administration officials about the workings of the secretive Department of Government Efficiency (DOGE) in a lawsuit seeking to block its access to federal agency systems. The unions have accused DOGE of operating in secrecy and potentially compromising sensitive information, including investigations into Elon Musk's companies. As the case unfolds, it remains unclear whether DOGE will ultimately be recognized as a formal government agency.

US Lawmakers Press Chinese Telecoms Over Ties to Military, Government Δ1.70

US lawmakers have raised national security concerns in letters to top Chinese telecom companies, China Mobile, China Telecom, and China Unicom, citing the potential for these firms to exploit access to American data through their U.S. cloud and internet businesses. The lawmakers are seeking details on any links between the companies and the Chinese military and government by March 31, amid concerns about unauthorized data access, espionage, or sabotage. National security experts have warned that China Telecom's operations in the US could pose a significant risk to American telecommunications networks.

Consumer Reports Finds Popular Voice Cloning Tools Lack Safeguards Δ1.70

A recent study by Consumer Reports reveals that many widely used voice cloning tools do not implement adequate safeguards to prevent potential fraud and misuse. The analysis of products from six companies indicated that only two took meaningful steps to mitigate the risk of unauthorized voice cloning, with most relying on a simple user attestation for permissions. This lack of protective measures raises significant concerns about the potential for AI voice cloning technologies to facilitate impersonation scams if not properly regulated.

Cozy Cats Live in a Raspberry Pi-Powered Luxury Automated Smart House Δ1.70

This amazing project is the ultimate expression of love for our feline friends, showcasing a luxurious smart home designed specifically for cats. The maker's use of Raspberry Pi and ESP32 sub-systems has created an automated haven with advanced features like temperature control, motion detection, and even night vision. This incredible setup provides a comfortable and safe environment for the pets, allowing their owners to pamper them in style.

Elon Musk Calls Social Security ‘The Biggest Ponzi Scheme of All Time’. Δ1.70

During a recent podcast with Joe Rogan, Elon Musk characterized the U.S. Social Security system as akin to a Ponzi scheme, raising alarms about its viability amid demographic shifts. He expressed concern that the system, which relies on a decreasing number of working-age contributors to support a growing retiree population, is unsustainable and in urgent need of reform. Musk's comments reflect a broader political debate about potential changes to entitlement programs, emphasizing the challenges posed by an aging population and declining birth rates.