The Hacker News

Syndikovat obsah
The Hacker News has been internationally recognized as a leading news source dedicated to promoting awareness for security experts and [email protected]
Aktualizace: 24 min 59 sek zpět

German Authorities Issue Arrest Warrants for Three Suspected Chinese Spies

23 Duben, 2024 - 12:16
German authorities said they have issued arrest warrants against three citizens on suspicion of spying for China. The full names of the defendants were not disclosed by the Office of the Federal Prosecutor (aka Generalbundesanwalt), but it includes Herwig F., Ina F., and Thomas R. "The suspects are strongly suspected of working for a Chinese secret service since an unspecified
Kategorie: Hacking & Security

German Authorities Issue Arrest Warrants for Three Suspected Chinese Spies

23 Duben, 2024 - 12:16
German authorities said they have issued arrest warrants against three citizens on suspicion of spying for China. The full names of the defendants were not disclosed by the Office of the Federal Prosecutor (aka Generalbundesanwalt), but it includes Herwig F., Ina F., and Thomas R. "The suspects are strongly suspected of working for a Chinese secret service since an unspecified Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

U.S. Imposes Visa Restrictions on 13 Linked to Commercial Spyware Misuse

23 Duben, 2024 - 08:43
The U.S. Department of State on Monday said it's taking steps to impose visa restrictions on 13 individuals who are allegedly involved in the development and sale of commercial spyware or who are immediately family members of those involved in such businesses. "These individuals have facilitated or derived financial benefit from the misuse of this technology, which
Kategorie: Hacking & Security

U.S. Imposes Visa Restrictions on 13 Linked to Commercial Spyware Misuse

23 Duben, 2024 - 08:43
The U.S. Department of State on Monday said it's taking steps to impose visa restrictions on 13 individuals who are allegedly involved in the development and sale of commercial spyware or who are immediately family members of those involved in such businesses. "These individuals have facilitated or derived financial benefit from the misuse of this technology, which Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Russia's APT28 Exploited Windows Print Spooler Flaw to Deploy 'GooseEgg' Malware

23 Duben, 2024 - 06:23
The Russia-linked nation-state threat actor tracked as APT28 weaponized a security flaw in the Microsoft Windows Print Spooler component to deliver a previously unknown custom malware called GooseEgg. The post-compromise tool, which is said to have been used since at least June 2020 and possibly as early as April 2019, leveraged a now-patched flaw that allowed for
Kategorie: Hacking & Security

Russia's APT28 Exploited Windows Print Spooler Flaw to Deploy 'GooseEgg' Malware

23 Duben, 2024 - 06:23
The Russia-linked nation-state threat actor tracked as APT28 weaponized a security flaw in the Microsoft Windows Print Spooler component to deliver a previously unknown custom malware called GooseEgg. The post-compromise tool, which is said to have been used since at least June 2020 and possibly as early as April 2019, leveraged a now-patched flaw that allowed for Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

ToddyCat Hacker Group Uses Advanced Tools for Industrial-Scale Data Theft

22 Duben, 2024 - 17:11
The threat actor known as ToddyCat has been observed using a wide range of tools to retain access to compromised environments and steal valuable data. Russian cybersecurity firm Kaspersky characterized the adversary as relying on various programs to harvest data on an "industrial scale" from primarily governmental organizations, some of them defense related, located in
Kategorie: Hacking & Security

ToddyCat Hacker Group Uses Advanced Tools for Industrial-Scale Data Theft

22 Duben, 2024 - 17:11
The threat actor known as ToddyCat has been observed using a wide range of tools to retain access to compromised environments and steal valuable data. Russian cybersecurity firm Kaspersky characterized the adversary as relying on various programs to harvest data on an "industrial scale" from primarily governmental organizations, some of them defense related, located in Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Pentera's 2024 Report Reveals Hundreds of Security Events per Week, Highlighting the Criticality of Continuous Validation

22 Duben, 2024 - 13:30
Over the past two years, a shocking 51% of organizations surveyed in a leading industry report have been compromised by a cyberattack. Yes, over half.  And this, in a world where enterprises deploy an average of 53 different security solutions to safeguard their digital domain.  Alarming? Absolutely. A recent survey of CISOs and CIOs, commissioned by Pentera and
Kategorie: Hacking & Security

Pentera's 2024 Report Reveals Hundreds of Security Events per Week, Highlighting the Criticality of Continuous Validation

22 Duben, 2024 - 13:30
Over the past two years, a shocking 51% of organizations surveyed in a leading industry report have been compromised by a cyberattack. Yes, over half.  And this, in a world where enterprises deploy an average of 53 different security solutions to safeguard their digital domain.  Alarming? Absolutely. A recent survey of CISOs and CIOs, commissioned by Pentera and The Hacker Newshttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

MITRE Corporation Breached by Nation-State Hackers Exploiting Ivanti Flaws

22 Duben, 2024 - 13:05
The MITRE Corporation revealed that it was the target of a nation-state cyber attack that exploited two zero-day flaws in Ivanti Connect Secure appliances starting in January 2024. The intrusion led to the compromise of its Networked Experimentation, Research, and Virtualization Environment (NERVE), an unclassified research and prototyping network. The unknown adversary "performed reconnaissance
Kategorie: Hacking & Security

MITRE Corporation Breached by Nation-State Hackers Exploiting Ivanti Flaws

22 Duben, 2024 - 13:05
The MITRE Corporation revealed that it was the target of a nation-state cyber attack that exploited two zero-day flaws in Ivanti Connect Secure appliances starting in January 2024. The intrusion led to the compromise of its Networked Experimentation, Research, and Virtualization Environment (NERVE), an unclassified research and prototyping network. The unknown adversary "performed reconnaissanceThe Hacker Newshttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Ransomware Double-Dip: Re-Victimization in Cyber Extortion

22 Duben, 2024 - 12:22
Between crossovers - Do threat actors play dirty or desperate? In our dataset of over 11,000 victim organizations that have experienced a Cyber Extortion / Ransomware attack, we noticed that some victims re-occur. Consequently, the question arises why we observe a re-victimization and whether or not this is an actual second attack, an affiliate crossover (meaning an affiliate has gone to
Kategorie: Hacking & Security

Ransomware Double-Dip: Re-Victimization in Cyber Extortion

22 Duben, 2024 - 12:22
Between crossovers - Do threat actors play dirty or desperate? In our dataset of over 11,000 victim organizations that have experienced a Cyber Extortion / Ransomware attack, we noticed that some victims re-occur. Consequently, the question arises why we observe a re-victimization and whether or not this is an actual second attack, an affiliate crossover (meaning an affiliate has gone to The Hacker Newshttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Researchers Uncover Windows Flaws Granting Hackers Rootkit-Like Powers

22 Duben, 2024 - 11:22
New research has found that the DOS-to-NT path conversion process could be exploited by threat actors to achieve rootkit-like capabilities to conceal and impersonate files, directories, and processes. "When a user executes a function that has a path argument in Windows, the DOS path at which the file or folder exists is converted to an NT path," SafeBreach security researcher Or Yair said&
Kategorie: Hacking & Security

Researchers Uncover Windows Flaws Granting Hackers Rootkit-Like Powers

22 Duben, 2024 - 11:22
New research has found that the DOS-to-NT path conversion process could be exploited by threat actors to achieve rootkit-like capabilities to conceal and impersonate files, directories, and processes. "When a user executes a function that has a path argument in Windows, the DOS path at which the file or folder exists is converted to an NT path," SafeBreach security researcher Or Yair said&Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Microsoft Warns: North Korean Hackers Turn to AI-Fueled Cyber Espionage

22 Duben, 2024 - 09:12
Microsoft has revealed that North Korea-linked state-sponsored cyber actors have begun to use artificial intelligence (AI) to make their operations more effective and efficient. "They are learning to use tools powered by AI large language models (LLM) to make their operations more efficient and effective," the tech giant said in its latest report on East Asia hacking groups. The
Kategorie: Hacking & Security

Microsoft Warns: North Korean Hackers Turn to AI-Fueled Cyber Espionage

22 Duben, 2024 - 09:12
Microsoft has revealed that North Korea-linked state-sponsored cyber actors have begun to use artificial intelligence (AI) to make their operations more effective and efficient. "They are learning to use tools powered by AI large language models (LLM) to make their operations more efficient and effective," the tech giant said in its latest report on East Asia hacking groups. The Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

New RedLine Stealer Variant Disguised as Game Cheats Using Lua Bytecode for Stealth

21 Duben, 2024 - 10:42
A new information stealer has been found leveraging Lua bytecode for added stealth and sophistication, findings from McAfee Labs reveal. The cybersecurity firm has assessed it to be a variant of a known malware called RedLine Stealer owing to the fact that the command-and-control (C2) server IP address has been previously identified as associated with the malware. RedLine Stealer,&nbsp
Kategorie: Hacking & Security

New RedLine Stealer Variant Disguised as Game Cheats Using Lua Bytecode for Stealth

21 Duben, 2024 - 10:42
A new information stealer has been found leveraging Lua bytecode for added stealth and sophistication, findings from McAfee Labs reveal. The cybersecurity firm has assessed it to be a variant of a known malware called RedLine Stealer owing to the fact that the command-and-control (C2) server IP address has been previously identified as associated with the malware. RedLine Stealer,&nbspNewsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security