❌

Reading view

There are new articles available, click to refresh the page.

In Homes With Children, Even Loaded Guns Are Often Left Unsecured

Firearms often are not stored safely in U.S. homes, a federal survey found. At the same time, gun-related suicides and injuries to children are on the rise.

Β© Arin Yoon for The New York Times

A handgun kept in a portable case with biometric fingerprint access. Gun storage practices vary, but in a new survey about half of gun owners with loaded firearms at home did not lock them away.

Sandy Hook survivors call for gun control as they graduate high school

Newtown students declare β€˜time for change’ more than 11 years after one of the deadliest US school shootings

Students who survived one of the deadliest school mass shootings in US history are graduating high school on Wednesday, as many call for more action on gun control.

Emotions were running high at Newtown high school in Connecticut on Wednesday, more than 11 years after a former student entered Sandy Hook elementary school in 2012 with guns and killed small children, teachers and staff in a massacre that shook the nation.

Continue reading...

πŸ’Ύ

Β© Photograph: Bryan Woolston/AP

πŸ’Ύ

Β© Photograph: Bryan Woolston/AP

Washington teen returning replica gun to store shot dead by security guard

Aaron Myers, 51, faces second-degree murder charge in fatal shooting of Hazrat Ali Rohani, 17, at Big 5 store in Renton

A teenager who tried to return a malfunctioning replica gun that shoots plastic projectiles to a sporting goods store in Washington state was shot to death by an off-duty security guard who believed the boy was holding a real gun and planned to rob the business, according to authorities.

The man arrested in the killing, 51-year-old Aaron Myers, told police that he was not working at the time he shot and killed Hazrat Ali Rohani, who was returning a malfunctioning airsoft gun to the Big 5 store in Renton. But he had offered to keep watch due to alleged rising crime in the area.

Continue reading...

πŸ’Ύ

Β© Photograph: Renton Police Department

πŸ’Ύ

Β© Photograph: Renton Police Department

CISA Alert: Urgent Update Needed for Apache Flink Vulnerability

Attention Apache Flink users! The U.S. Cybersecurity and Infrastructure Security Agency (CISA) recently added an Apache Flink vulnerability to its Known Exploited Vulnerabilities Catalog, highlighting evidence of its active exploitation. Apache Flink is a popular open-source framework for processing large streams of data. It’s widely used in big data analytics and real-time applications. However, like […]

The post CISA Alert: Urgent Update Needed for Apache Flink Vulnerability appeared first on TuxCare.

The post CISA Alert: Urgent Update Needed for Apache Flink Vulnerability appeared first on Security Boulevard.

Beware! New Android Trojan β€˜Viper RAT’ on Dark Web Steals Your Data

Viper RAT

Dark web actors are advertising a new Android Remote Trojan called Viper RAT that targets Android devices. The threat actor, which goes by the same name, has asserted that this malicious tool has a plethora of capabilities. On May 31, 2024, information about the advertising of a brand-new Android Remote Trojan Access (RAT) called "VIPER RAT" on the CrackingX and OnniForums forums became public. According to the post, the Viper RAT can be rented for a mere $499 with capacities of targeting and penetrating devices based on Android operating systems.

Android Remote Trojan Viper RAT Advertised on Dark Web Forums

A multi-grabber for credentials, emails, 2FA codes, wallets, and keys is one of the features that are offered, along with keylogging capabilities. Additionally, this Android Remote Trojan Viper RAT offers more than 600 word-wide injections, phone unlocking, VNC control, and audio and video recording capabilities to aid with phishing redirection. To add a degree of credibility, the threat actor provides a dedicated website, viperrat[.]com (domain registered on May 17, 2024), and a Telegram account for orders. The unnervingly low cost of the Viper RAT suggests that its release was motivated by malevolence. The efficacy of this device is demonstrated by the two demonstration videos that the threat actor has uploaded on the main website. The Viper RAT has previously made an appearance in the world of cybercrime. The author made the initial introduction to CrackingX on May 8, 2024, and updated the features on May 31, 2024. The threat actor's overt endorsement of the Viper RAT highlights how serious the risks are for Android users everywhere.

Advanced Features, Capabilities, and Pricing

The threat actor's pitch on underground forums paints a grim picture of the Viper RAT's capabilities. Promising "Viper Android Rat Hidden Screen Control Unlock Phone | Grab VE 2FA β˜…Crypto," the actor markets it as the "Best Android Remote Control," with a reminder that "The only secure phone is that powered off, cast in a block of concrete and sealed in a lead-lined room with armed guards." The pricing tiers begin at $499, and customized versions can be ordered. The threat actor highlights that installation support is given without charge, but there are no trial offers. Only cryptocurrency can be used as a form of payment, further obscuring illegal activities. Among the features listed by the threat actor, Viper RAT has a set of other factions that are specifically designed to target Android devices regardless of what hardware they are using. To shed light on some of its features, the Android RAT can achieve live keylogging and phishing redirection to multi-grabber features and seamless screen control. The Viper RAT also offers many more features, such as smooth hidden VNC control, screen capture, unlocking pin and pattern, controller support for APKs up to version 14, and much more. Due to these features, the threat actor has unparalleled access to personal information, enabling them to act destructively and surreptitiously. Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

How the Internet of Things (IoT) became a dark web target – and what to do about it – Source: www.cybertalk.org

how-the-internet-of-things-(iot)-became-a-dark-web-target-–-and-what-to-do-about-it-–-source:-wwwcybertalk.org

Source: www.cybertalk.org – Author: slandau By Antoinette Hodes, Office of the CTO, Check Point Software Technologies. The dark web has evolved into a clandestine marketplace where illicit activities flourish under the cloak of anonymity. Due to its restricted accessibility, the dark web exhibits a decentralized structure with minimal enforcement of security controls, making it a […]

La entrada How the Internet of Things (IoT) became a dark web target – and what to do about it – Source: www.cybertalk.org se publicΓ³ primero en CISO2CISO.COM & CYBER SECURITY GROUP.

❌