News Recap #4 – Most important cyber security news of the week | cybernews.com
Visit our website for more relevant cyber security news and more
CLICK HERE 👉 https://cnews.link/NEWS-122/
About us: our dedicated team of security researchers and investigative journalists regularly delves into previously unexplored depths of online security and privacy in order to shed light on stories that often have an unseen influence on the online world at large. A number of our investigations and reports have been featured by industry-related publications and global news leaders like Forbes, PC mag, Techradar.
——————————————————————————–
A week can be a long time in the cyberworld, so you might have missed some of the important news from this week. Let us recap the highlights of this week’s cybernews.
——————————————————————————–
// Timestamps //
0:15 Can PACMAN Eat the Apple M1 Chip?
2:07 University of Pisa held at ransom for $4.5 million | cybernews.com
3:46 Crypto Crash: Coinbase fires employees
4:57 Free VPN Leaked Data and Exposed Users
——————————————————————————–
🔥 ESSENTIAL CYBER HYGIENE KIT / Get discounts 🔥
——————————————————————————————
🔐 Best VPN in 2022 – NordVPN: https://cnews.link/NEWS-NordVPN-9/
💥 Most feature-rich antivirus – Norton: https://cnews.link/NEWS-NordVPN-9/
🔑Most secure password manager – NordPass: https://cnews.link/NEWS-NordPass-9/
——————————————————————————————
Let’s start this week’s recap with the most important question: Can PACMAN eat the Apple M1 chip? Oh, wait, let me clarify that first:
Recently it became known that cyber attackers might use a novel hardware attack targeting Pointer Authentication (in short PAC) on the Apple M1 CPU to gain arbitrary code execution on Mac systems.
Arbitrary code execution refers to a threat actor’s ability to run commands or code on a target system, while pointer authentication codes are designed to detect and guard against unexpected changes to pointers in memory. Scientists named the new attack technique the PACMAN.
They said in a paper – “PACMAN is what you get when you mix a hardware mitigation for software attacks with microarchitectural side channels. We believe the core idea of PACMAN will be applicable to much more than just PAC”
The researchers added that – PACMAN is an exploitation technique – on its own it cannot compromise your system. While the hardware mechanisms used by PACMAN cannot be patched with software features, memory corruption bugs can.
Researchers have not witnessed this attack being used in the wild. They have reported their findings and proof-of-concept code to Apple, and have been in talks with them since 2021.
BlackCat, one of the first ransomware families written in the Rust programming language, entered the stage in November 2021. Lately, it’s been among the most active ransomware gangs.
The criminals issued a ransom note for Saturday’s attack, giving the university administration until June 16 to pay 4.5 million euros.
“Coinbase » is planning to reduce its workforce globally. The company is planning to reduce its workforce by approximately 1,100 employees.
By the end of the current fiscal quarter, Coinbase expects to have approximately 5,000 employees.
It estimates that the restructuration will incur about $40 million to $45 million in total restructuring expenses.
The Cybernews team discovered an open database containing 18 and a half gigabytes of connection logs generated by the BeanVPN app.
The dataset contained over 25 million records, including user device and Play Service ID, IP addresses, and connection timestamps, among other diagnostic information.
The information found in this database could be used to de-anonymize users that use BeanVPN, and find their approximate location using geo-IP databases.
Aras Nazarovas, a security researcher from Cybernews commented on the case that – “The Play Service ID could also be used to find out the user’s email address that they are signed in to their device with, »
Cybernews repeatedly reached out to BeanVPN developers for a comment but had not received a reply.
Keep up to date with the latest news:
➡️ Visit our site https://cybernews.com/
➡️ Facebook https://www.facebook.com/cybernewscom/
➡️ Twitter https://twitter.com/cybernews
➡️ #cybernews #TechNewsByAI #cybernewsByAI
Views : 703
cyber security