Recent #security news in the semiconductor industry

about 1 month ago

➀ Microsoft warns that the MacOS malware XCSSET has evolved significantly since earlier this year, with key changes in its browser targeting, clipboard hijacking, and persistence mechanisms.

➁ The latest variant targets Xcode software developers on MacOS, monitoring the clipboard for cryptocurrency wallet addresses and replacing them with its own.

➂ Microsoft has collaborated with Apple and GitHub to mitigate the threat, and provides tips for users to protect themselves.

cybersecuritymacOSsecurity
about 2 months ago

➀ Eito Miyamura and his team demonstrated how ChatGPT can be tricked into revealing sensitive email data using a vulnerability in the Model Context Protocol (MCP);

➁ The vulnerability allows attackers to send a calendar invite with a jailbreak prompt to the victim's email address;

➂ ChatGPT is then manipulated to read the email and send sensitive information back to the attackers without the need for the invite to be accepted.

AIHackerssecurity
2 months ago

➀ Black hat hackers have shown no bounds of cruelty in their operations, disregarding ethical considerations.

➁ A recent ransomware attack on the Maryland Transit Administration (MTA) has impacted its paratransit service for disabled people.

➂ The MTA is collaborating with the Maryland Department of Information Technology and third-party cybersecurity experts to investigate and mitigate the impact of the attack.

cybersecuritysecurity
3 months ago

➀ Silicon Labs announces SiXG301 as the world's first PSA Level 4 iSE/SE-certified SoC, offering advanced hardware/software protection against attacks like laser fault injection and side-channel vulnerabilities.

➁ The 22nm SoC, designed for IoT/edge devices, supports over-a-decade field operation with OTA updates and real-time monitoring, set for Q3 2025 availability.

➂ Collaboration with Keysight Labs validated the security features, addressing emerging threats once deemed theoretical.

SoCsecurity
3 months ago

➀ An estimated $1 billion was extorted by ransomware gangs last year, and projections suggest they could generate $265 billion annually within six years.

➁ A ransomware attack on a 158-year-old transport company, KNP, resulted in over 700 job losses due to a weak password being exploited.

➂ The Akira gang, known for sophisticated encryption techniques, attacked KNP but did not specify a ransom amount.

security
4 months ago

➀ DigitalMint, a financial cybersecurity firm, is investigating one of its former employees for alleged collaboration with ransomware gangs to receive illegal payments.

➁ Negotiators are often called upon to handle discussions with hackers on behalf of victims, and DigitalMint specializes in managing ransomware incidents and facilitating secure payments.

➂ The incident has raised concerns about the operations of data recovery and financial cybersecurity firms, following previous reports of deception by firms claiming to recover data through specialized methods while simply paying the ransom and charging clients extra.

security
5 months ago

➀ Amazon introduces a new version of its popular Blink Video Doorbell with exceptional battery life, offering up to two years of continuous security coverage with three AA Energizer lithium batteries.

➁ The new Blink Video Doorbell comes with a head-to-toe HD view, 1440p video resolution, a 150-degree field of view, and improved IP65 water resistance.

➂ The doorbell requires the new Sync Module Core and offers a 1-year subscription bundle for cloud storage and smart notifications.

security
5 months ago

➀ The 3AM ransomware group has been using more proactive techniques, such as email bombing and spoofed IT support calls, to gain access to corporate systems.

➁ Sophos has documented over 55 attempted attacks using this technique in the first quarter of 2025.

➂ The attackers used a pre-configured Windows 7 virtual machine to establish a hidden foothold and evade network protection software.

Hackingsecurity
6 months ago

➀ Io_uring was introduced in 2019 to improve the efficiency and flexibility of input and output operations on Linux, but it also created critical blind spots for Linux security tools.

➁ Security researchers have discovered that io_uring operations can completely evade conventional system call monitoring, leading to undetectable activities.

➂ A rootkit called Curing was built to exploit this vulnerability, which can execute commands, read files, and interact with the network without detectable system calls.

LinuxVulnerabilitysecurity