Visualização de leitura
BITTER APT Uses Signal, Google, and Zoom Lures to Spread ProSpy Spyware
UNC1069 Targets Node.js Maintainers via Fake LinkedIn, Slack Profiles
New Fake Zoom Meeting Invite Scam Spreads Malware on Windows PCs
A week in security (February 23 – March 1)
A list of topics we covered in the week of February 23 to March 1 of 2026
The post A week in security (February 23 – March 1) appeared first on Security Boulevard.
A week in security (February 23 – March 1)
Last week on Malwarebytes Labs:
- Public Google API keys can be used to expose Gemini AI data
- Inside a fake Google security check that becomes a browser RAT
- Fake Zoom and Google Meet scams install Teramind: A technical deep dive
- How to understand and avoid Advanced Persistent Threats
- The Conduent breach; from 10 million to 25 million (and counting)
- Instagram flagged explicit messages to minors in 2018. Image-blurring arrived six years later
- Developer creates app to detect nearby smart glasses
- Reddit, porn sites fined by UK regulators over children’s safety and privacy
- Roblox gives predators “powerful tools” to target children, says LA County
- Fake Zoom meeting “update” silently installs unauthorized version of monitoring tool abused by cybercriminals to spy on victims
- Refund scam impersonates Avast to harvest credit card details
- OpenClaw: What is it and can you use it safely?
- Password managers keep your passwords safe, unless…
- Fake Huorong security site infects users with ValleyRAT
- What can’t you say on TikTok?
Stay safe!
We don’t just report on threats—we remove them
Cybersecurity risks should never spread beyond a headline. Keep threats off your devices by downloading Malwarebytes today.
Zoom and GitLab Patch RCE, DoS, and 2FA Bypass Vulnerabilities
Both platforms serve as backbone infrastructure for remote work and software development, making these flaws particularly dangerous for business continuity.
The post Zoom and GitLab Patch RCE, DoS, and 2FA Bypass Vulnerabilities appeared first on TechRepublic.
Startup necromancy: Dead Google Apps domains can be compromised by new owners
Lots of startups use Google’s productivity suite, known as Workspace, to handle email, documents, and other back-office matters. Relatedly, lots of business-minded webapps use Google’s OAuth, i.e. “Sign in with Google.” It’s a low-friction feedback loop—up until the startup fails, the domain goes up for sale, and somebody forgot to close down all the Google stuff.
Dylan Ayrey, of Truffle Security Co., suggests in a report that this problem is more serious than anyone, especially Google, is acknowledging. Many startups make the critical mistake of not properly closing their accounts—on both Google and other web-based apps—before letting their domains expire.
Given the number of people working for tech startups (6 million), the failure rate of said startups (90 percent), their usage of Google Workspaces (50 percent, all by Ayrey’s numbers), and the speed at which startups tend to fall apart, there are a lot of Google-auth-connected domains up for sale at any time. That would not be an inherent problem, except that, as Ayrey shows, buying a domain with a still-active Google account can let you re-activate the Google accounts for former employees.


© Aurich Lawson | Getty Images