Safer with Google: Advancing Memory Safety

Actualités
Posted by Alex Rebert, Security Foundations, and Chandler Carruth, Jen Engel, Andy Qin, Core Developers Error-prone interactions between software and memory1 are widely understood to create safety issues in software. It is estimated that about 70% of severe vulnerabilities2 in memory-unsafe codebases are due to memory safety bugs. Malicious actors exploit these vulnerabilities and continue to create real-world harm. In 2023, Google’s threat intelligence teams conducted an industry-wide study and observed a close to all-time high number of vulnerabilities exploited in the wild. Our internal analysis estimates that 75% of CVEs used in zero-day exploits are memory safety vulnerabilities. At Google, we have been mindful of these issues for over two decades, and are on a journey to continue advancing the state of memory safety in the software we consume…
Read More

TrickMo Banking Trojan Can Now Capture Android PINs and Unlock Patterns

Actualités
New variants of an Android banking trojan called TrickMo have been found to harbor previously undocumented features to steal a device's unlock pattern or PIN. "This new addition enables the threat actor to operate on the device even while it is locked," Zimperium security researcher Aazim Yaswant said in an analysis published last week. First spotted in the wild in 2019, TrickMo is so named for
Read More

New Malware Campaign Uses PureCrypter Loader to Deliver DarkVision RAT

Actualités
Cybersecurity researchers have disclosed a new malware campaign that leverages a malware loader named PureCrypter to deliver a commodity remote access trojan (RAT) called DarkVision RAT. The activity, observed by Zscaler ThreatLabz in July 2024, involves a multi-stage process to deliver the RAT payload. "DarkVision RAT communicates with its command-and-control (C2) server using a custom network
Read More

New Linux Variant of FASTCash Malware Targets Payment Switches in ATM Heists

Actualités
North Korean threat actors have been observed using a Linux variant of a known malware family called FASTCash to steal funds as part of a financially-motivated campaign. The malware is "installed on payment switches within compromised networks that handle card transactions for the means of facilitating the unauthorized withdrawal of cash from ATMs," a security researcher who goes by HaxRob said.
Read More

EU Cybersecurity Skills Conference 2024 (ENISA)

Actualités
ENISA, in collaboration with the Hungarian Presidency of the EU Council, hosted the 3rd Cybersecurity Skills Conference on September 26-27, 2024, in Budapest. Day 1 focused on NIS2 implementation, the Cyber Skills Academy, and capacity building for the Western Balkans. Day 2 explored the diverse applications of the European Cybersecurity Skills Framework (ECSF) by various stakeholders in different contexts.
Read More

The Rise of Zero-Day Vulnerabilities: Why Traditional Security Solutions Fall Short

Actualités
In recent years, the number and sophistication of zero-day vulnerabilities have surged, posing a critical threat to organizations of all sizes. A zero-day vulnerability is a security flaw in software that is unknown to the vendor and remains unpatched at the time of discovery. Attackers exploit these flaws before any defensive measures can be implemented, making zero-days a potent weapon for
Read More