News Gist .News

Articles | Politics | Finance | Stocks | Crypto | AI | Technology | Science | Gaming | PC Hardware | Laptops | Smartphones | Archive

Parallels Desktop Security Flaws Raise Concerns for Mac Users

A researcher has raised concerns about Parallels Desktop's lack of proper patching, leaving its flaws unaddressed for seven months. The company's failure to address these vulnerabilities resulted in a public disclosure of exploits by another researcher, highlighting the risks that Mac users face when using the software. Parallels Desktop's security flaws pose significant threats to user data and system integrity.

See Also

Threat Posed by New VMware Hyperjacking Vulnerabilities Is Hard to Overstate Δ1.79

A recently discovered trio of vulnerabilities in VMware's virtual machine products can grant hackers unprecedented access to sensitive environments, putting entire networks at risk. If exploited, these vulnerabilities could allow a threat actor to escape the confines of one compromised virtual machine and access multiple customers' isolated environments, effectively breaking all security boundaries. The severity of this attack is compounded by the fact that VMware warned it has evidence suggesting the vulnerabilities are already being actively exploited in the wild.

Broadcom Releases Fixes for Multiple VMware Security Flaws Δ1.79

Broadcom has released patches for three critical vulnerabilities in its VMware products, which are already being exploited in the wild. The bugs were described as VM escape flaws and affect all supported versions of VMware ESX, vSphere, Cloud Foundation, and Telco Cloud Platform. These issues were deemed severe enough to warrant immediate attention from users, who are urged to apply the fixes as soon as possible.

Microsoft Discoveries Vulnerable Software Attack. Δ1.77

Microsoft has confirmed that its Windows drivers and software are being exploited by hackers through zero-day attacks, allowing them to escalate privileges and potentially drop ransomware on affected machines. The company patched five flaws in a kernel-level driver for Paragon Partition Manager, which were apparently found in BioNTdrv.sys, a piece of software used by the partition manager. Users are urged to apply updates as soon as possible to secure their systems.

Software Bug at Firm Left NHS Data 'Vulnerable to Hackers' Δ1.76

The NHS is investigating claims that a software flaw at Medefer compromised patient data security, as the issue was discovered in November but may have existed for several years. Medefer has stated that no patient data breach occurred and that the flaw was promptly addressed, although cybersecurity experts have raised concerns about the company's response to the vulnerability. The situation underscores the critical importance of robust cybersecurity measures in handling sensitive medical information, especially within the healthcare sector.

Researchers Uncover Unknown Android Flaws Used to Hack Into a Student's Phone Δ1.73

Amnesty International said that Google fixed previously unknown flaws in Android that allowed authorities to unlock phones using forensic tools. On Friday, Amnesty International published a report detailing a chain of three zero-day vulnerabilities developed by phone-unlocking company Cellebrite, which its researchers found after investigating the hack of a student protester’s phone in Serbia. The flaws were found in the core Linux USB kernel, meaning “the vulnerability is not limited to a particular device or vendor and could impact over a billion Android devices,” according to the report.

Zapier Data Breach Raises Concerns Over Customer Information Security. Δ1.73

Zapier, a popular automation tool, has suffered a cyberattack that resulted in the loss of sensitive customer information. The company's Head of Security sent a breach notification letter to affected customers, stating that an unnamed threat actor accessed some customer data "inadvertently copied to the repositories" for debugging purposes. Zapier assures that the incident was isolated and did not affect any databases, infrastructure, or production systems.

Breaking Into Code: Security Threat Impacts Customer Data at Zapier Δ1.73

Zapier has disclosed a security incident where an unauthorized user gained access to its code repositories due to a 2FA misconfiguration, potentially exposing customer data. The breach resulted from an "unauthorized user" accessing certain "certain Zapier code repositories" and may have accessed customer information that had been "inadvertently copied" to the repositories for debugging purposes. The incident has raised concerns about the security of cloud-based platforms.

Malware Hijacks Nearly 1 Million Windows Devices in Advanced Malvertising Attack Δ1.72

A broad overview of the four stages shows that nearly 1 million Windows devices were targeted by a sophisticated "malvertising" campaign, where malware was embedded in ads on popular streaming platforms. The malicious payload was hosted on platforms like GitHub and used Discord and Dropbox to spread, with infected devices losing login credentials, cryptocurrency, and other sensitive data. The attackers exploited browser files and cloud services like OneDrive to steal valuable information.

Human Rights Abused: Governments Exploit Vulnerabilities to Silence Critics Δ1.72

Amnesty International has uncovered evidence that a zero-day exploit sold by Cellebrite was used to compromise the phone of a Serbian student who had been critical of the government, highlighting a campaign of surveillance and repression. The organization's report sheds light on the pervasive use of spyware by authorities in Serbia, which has sparked international condemnation. The incident demonstrates how governments are exploiting vulnerabilities in devices to silence critics and undermine human rights.

Firm Says AI-Assisted Security Analyzer Found 16 Bugs in OpenRISC CPU Core in Under 60 Seconds Δ1.71

Caspia Technologies has made a significant claim about its CODAx AI-assisted security linter, which has identified 16 security bugs in the OpenRISC CPU core in under 60 seconds. The tool uses a combination of machine learning algorithms and security rules to analyze processor designs for vulnerabilities. The discovery highlights the importance of design security and product assurance in the semiconductor industry.

The Dark Side of Chrome Extensions: Hidden Dangers Lurking on Your PC Δ1.71

As recent news reminds us, malicious browser add-ons can start life as legit extensions. Reviewing what you’ve got installed is a smart move. Earlier this month, an alarm sounded—security researchers at GitLab Threat Intelligence discovered a handful of Chrome extensions adding code in order to commit fraud, with at least 3.2 million users affected. But the add-ons didn’t start as malicious. Instead, they launched as legitimate software, only to be later compromised or sold to bad actors.

Apple Refuses to Break Encryption, Seeks Reversal of UK Demand for Backdoor Δ1.71

Apple's appeal to the Investigatory Powers Tribunal may set a significant precedent regarding the limits of government overreach into technology companies' operations. The company argues that the UK government's power to issue Technical Capability Notices would compromise user data security and undermine global cooperation against cyber threats. Apple's move is likely to be closely watched by other tech firms facing similar demands for backdoors.

Microsoft Teams and Other Windows Tools Hijacked to Hack Corporate Networks Δ1.71

Hackers are exploiting Microsoft Teams and other legitimate Windows tools to launch sophisticated attacks on corporate networks, employing social engineering tactics to gain access to remote desktop solutions. Once inside, they sideload flawed .DLL files that enable the installation of BackConnect, a remote access tool that allows persistent control over compromised devices. This emerging threat highlights the urgent need for businesses to enhance their cybersecurity measures, particularly through employee education and the implementation of multi-factor authentication.

Seagate Hard Drive Controversy Persists as Scammers Discover Methods to Alter Reliability Metrics Δ1.71

Seagate's ongoing issues with counterfeit hard drive sales have taken a new turn, as scammers have discovered methods to manipulate Field Accessible Reliability Metrics (FARM) values, making it difficult for consumers to detect tampered devices. This latest development presents a significant challenge for Seagate and its customers, who must now find alternative ways to verify the authenticity of their purchases. The company has advised resellers to buy drives only from certified distribution partners to ensure authenticity.

Advanced Cyber Threats on Network Devices Worry Global Internet Security Δ1.71

Sophisticated, advanced threats have been found lurking in the depths of the internet, compromising Cisco, ASUS, QNAP, and Synology devices. A previously-undocumented botnet, named PolarEdge, has been expanding around the world for more than a year, targeting a range of network devices. The botnet's goal is unknown at this time, but experts have warned that it poses a significant threat to global internet security.

X Platform Outage Appears to Ease, Downdetector Shows Δ1.71

An outage on Elon Musk's social media platform X appeared to ease after thousands of users in the U.S. and the UK reported glitches on Monday, according to outage-tracking website Downdetector.com. The number of reports in the U.S. dropped to 403 as of 6:24 a.m. ET from more than 21,000 incidents earlier, user-submitted data on Downdetector showed. Reports in the UK also decreased significantly, with around 200 incidents reported compared to 10,800 earlier.

Ransomware Dominates Cybersecurity Threats in 2024 Δ1.71

The modern-day cyber threat landscape has become increasingly crowded, with Advanced Persistent Threats (APTs) becoming a major concern for cybersecurity teams worldwide. Group-IB's recent research points to 2024 as a 'year of cybercriminal escalation', with a 10% rise in ransomware compared to the previous year, and a 22% rise in phishing attacks. The "Game-changing" role of AI is being used by both security teams and cybercriminals, but its maturity level is still not there yet.

Technical Issues Resolved Across Whatsapp and Other Meta Apps Δ1.70

WhatsApp's recent technical issue, reported by thousands of users, has been resolved, according to a spokesperson for the messaging service. The outage impacted users' ability to send messages, with some also experiencing issues with Facebook and Facebook Messenger. Meta's user base is massive, making any glitches feel like they affect millions worldwide.

Google Researchers Release Kit to Exploit Microcode Vulnerability in AMD CPUs Δ1.70

A team of Google researchers has identified a significant exploit, named "EntrySign," affecting AMD's Zen 1 through Zen 4 processors, which allows users with local admin privileges to push custom microcode updates. This vulnerability, while requiring high-level access to exploit, poses serious implications for security, as it enables users to manipulate CPU behavior and potentially weaken system protections. AMD has issued a BIOS patch to address the issue, but many CPUs remain vulnerable until updated, highlighting the ongoing challenges of CPU security management.

Microsoft Warns of Chinese Hackers Targeting Cloud Apps to Steal Business Data Δ1.70

Microsoft's Threat Intelligence has identified a new tactic from Chinese threat actor Silk Typhoon towards targeting "common IT solutions" such as cloud applications and remote management tools in order to gain access to victim systems. The group has been observed attacking a wide range of sectors, including IT services and infrastructure, healthcare, legal services, defense, government agencies, and many more. By exploiting zero-day vulnerabilities in edge devices, Silk Typhoon has established itself as one of the Chinese threat actors with the "largest targeting footprints".

The Biggest Data Breaches of 2025 — so Far Δ1.70

2025 has already emerged as a significant year for data breaches, with incidents affecting millions, including sensitive student and health records. Notably, the PowerSchool breach has been highlighted as one of the largest, impacting over 62 million students and teachers, while other breaches have compromised U.S. federal government data and healthcare information. The sheer scale of these breaches underscores the pressing concerns surrounding data security and the vulnerabilities inherent in various systems.

CrowdStrike Shares Tumble After Disappointing Earnings Outlook Δ1.70

CrowdStrike Holding Inc. shares plummeted after the cybersecurity company issued a worse-than-expected earnings outlook, indicating that it's still recovering from a flawed software update that crashed millions of computers globally last year. The company's adjusted earnings for the three months ending April 30 fell short of analyst projections, sending the shares down by as much as 12% in intraday trading. CrowdStrike's quarterly report showed strong subscription revenue growth, but disappointing free cash flow and investigations into a major deal with Carahsoft Technology Corp.

More Reports Claim 2024 Was the Worst Year for Ransomware Attacks Yet. Δ1.70

2024 has been marked as a record-breaking year for ransomware attacks, with a 65% increase in detected groups and 44 new malware variants contributing to almost a third of undisclosed attacks. The healthcare, government, and education sectors were disproportionately affected, while emerging groups like LockBit and RansomHub accounted for a significant number of incidents, highlighting the growing sophistication of cybercriminals. As organizations face escalating financial and reputational risks, the need for proactive cybersecurity measures has never been more urgent.

Private API Keys and Passwords Found in AI Training Dataset - Nearly 12,000 Details Leaked Δ1.70

Truffle Security found thousands of pieces of private info in Common Crawl dataset.Common Crawl is a nonprofit organization that provides a freely accessible archive of web data, collected through large-scale web crawling. The researchers notified the vendors and helped fix the problemCybersecurity researchers have uncovered thousands of login credentials and other secrets in the Common Crawl dataset, compromising the security of various popular services like AWS, MailChimp, and WalkScore.

Microsoft Quietly Updates Copilot to Cut Down on Unauthorized Windows Activations Δ1.70

Microsoft has implemented a patch to its Windows Copilot, preventing the AI assistant from inadvertently facilitating the activation of unlicensed copies of its operating system. The update addresses previous concerns that Copilot was recommending third-party tools and methods to bypass Microsoft's licensing system, reinforcing the importance of using legitimate software. While this move showcases Microsoft's commitment to refining its AI capabilities, unauthorized activation methods for Windows 11 remain available online, albeit no longer promoted by Copilot.