The Hacker News

Syndikovat obsah
The Hacker News has been internationally recognized as a leading news source dedicated to promoting awareness for security experts and [email protected]
Aktualizace: 12 min 46 sek zpět

Iran-Linked MuddyWater Deploys Atera for Surveillance in Phishing Attacks

25 Březen, 2024 - 08:37
The Iran-affiliated threat actor tracked as MuddyWater (aka Mango Sandstorm or TA450) has been linked to a new phishing campaign in March 2024 that aims to deliver a legitimate Remote Monitoring and Management (RMM) solution called Atera. The activity, which took place from March 7 through the week of March 11, targeted Israeli entities spanning global manufacturing, technology, and
Kategorie: Hacking & Security

Iran-Linked MuddyWater Deploys Atera for Surveillance in Phishing Attacks

25 Březen, 2024 - 08:37
The Iran-affiliated threat actor tracked as MuddyWater (aka Mango Sandstorm or TA450) has been linked to a new phishing campaign in March 2024 that aims to deliver a legitimate Remote Monitoring and Management (RMM) solution called Atera. The activity, which took place from March 7 through the week of March 11, targeted Israeli entities spanning global manufacturing, technology, and Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

N. Korea-linked Kimsuky Shifts to Compiled HTML Help Files in Ongoing Cyberattacks

24 Březen, 2024 - 06:38
The North Korea-linked threat actor known as Kimsuky (aka Black Banshee, Emerald Sleet, or Springtail) has been observed shifting its tactics, leveraging Compiled HTML Help (CHM) files as vectors to deliver malware for harvesting sensitive data. Kimsuky, active since at least 2012, is known to target entities located in South Korea as well as North America, Asia, and Europe. According
Kategorie: Hacking & Security

N. Korea-linked Kimsuky Shifts to Compiled HTML Help Files in Ongoing Cyberattacks

24 Březen, 2024 - 06:38
The North Korea-linked threat actor known as Kimsuky (aka Black Banshee, Emerald Sleet, or Springtail) has been observed shifting its tactics, leveraging Compiled HTML Help (CHM) files as vectors to deliver malware for harvesting sensitive data. Kimsuky, active since at least 2012, is known to target entities located in South Korea as well as North America, Asia, and Europe. According Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

German Police Seize 'Nemesis Market' in Major International Darknet Raid

24 Březen, 2024 - 06:24
German authorities have announced the takedown of an illicit underground marketplace called Nemesis Market that peddled narcotics, stolen data, and various cybercrime services. The Federal Criminal Police Office (aka Bundeskriminalamt or BKA) said it seized the digital infrastructure associated with the darknet service located in Germany and Lithuania and confiscated €94,000 ($102,107)
Kategorie: Hacking & Security

German Police Seize 'Nemesis Market' in Major International Darknet Raid

24 Březen, 2024 - 06:24
German authorities have announced the takedown of an illicit underground marketplace called Nemesis Market that peddled narcotics, stolen data, and various cybercrime services. The Federal Criminal Police Office (aka Bundeskriminalamt or BKA) said it seized the digital infrastructure associated with the darknet service located in Germany and Lithuania and confiscated €94,000 ($102,107)Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Russian Hackers Use 'WINELOADER' Malware to Target German Political Parties

23 Březen, 2024 - 07:03
The WINELOADER backdoor used in recent cyber attacks targeting diplomatic entities with wine-tasting phishing lures has been attributed as the handiwork of a hacking group with links to Russia's Foreign Intelligence Service (SVR), which was responsible for breaching SolarWinds and Microsoft. The findings come from Mandiant, which said Midnight Blizzard (aka APT29, BlueBravo, or
Kategorie: Hacking & Security

Russian Hackers Use 'WINELOADER' Malware to Target German Political Parties

23 Březen, 2024 - 07:03
The WINELOADER backdoor used in recent cyber attacks targeting diplomatic entities with wine-tasting phishing lures has been attributed as the handiwork of a hacking group with links to Russia's Foreign Intelligence Service (SVR), which was responsible for breaching SolarWinds and Microsoft. The findings come from Mandiant, which said Midnight Blizzard (aka APT29, BlueBravo, or Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

New StrelaStealer Phishing Attacks Hit Over 100 Organizations in E.U. and U.S.

22 Březen, 2024 - 15:08
Cybersecurity researchers have detected a new wave of phishing attacks that aim to deliver an ever-evolving information stealer referred to as StrelaStealer. The campaigns impact more than 100 organizations in the E.U. and the U.S., Palo Alto Networks Unit 42 researchers said in a new report published today. "These campaigns come in the form of spam emails with attachments that eventually
Kategorie: Hacking & Security

New StrelaStealer Phishing Attacks Hit Over 100 Organizations in E.U. and U.S.

22 Březen, 2024 - 15:08
Cybersecurity researchers have detected a new wave of phishing attacks that aim to deliver an ever-evolving information stealer referred to as StrelaStealer. The campaigns impact more than 100 organizations in the E.U. and the U.S., Palo Alto Networks Unit 42 researchers said in a new report published today. "These campaigns come in the form of spam emails with attachments that eventually Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

AWS Patches Critical 'FlowFixation' Bug in Airflow Service to Prevent Session Hijacking

22 Březen, 2024 - 14:45
Cybersecurity researchers have shared details of a now-patched security vulnerability in Amazon Web Services (AWS) Managed Workflows for Apache Airflow (MWAA) that could be potentially exploited by a malicious actor to hijack victims' sessions and achieve remote code execution on underlying instances. The vulnerability, now addressed by AWS, has been codenamed FlowFixation by Tenable.
Kategorie: Hacking & Security

AWS Patches Critical 'FlowFixation' Bug in Airflow Service to Prevent Session Hijacking

22 Březen, 2024 - 14:45
Cybersecurity researchers have shared details of a now-patched security vulnerability in Amazon Web Services (AWS) Managed Workflows for Apache Airflow (MWAA) that could be potentially exploited by a malicious actor to hijack victims' sessions and achieve remote code execution on underlying instances. The vulnerability, now addressed by AWS, has been codenamed FlowFixation by Tenable. Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

China-Linked Group Breaches Networks via Connectwise, F5 Software Flaws

22 Březen, 2024 - 12:28
A China-linked threat cluster leveraged security flaws in Connectwise ScreenConnect and F5 BIG-IP software to deliver custom malware capable of delivering additional backdoors on compromised Linux hosts as part of an "aggressive" campaign. Google-owned Mandiant is tracking the activity under its uncategorized moniker UNC5174 (aka Uteus or Uetus), describing it as a "former
Kategorie: Hacking & Security

Implementing Zero Trust Controls for Compliance

22 Březen, 2024 - 12:28
The ThreatLocker® Zero Trust Endpoint Protection Platform implements a strict deny-by-default, allow-by-exception security posture to give organizations the ability to set policy-based controls within their environment and mitigate countless cyber threats, including zero-days, unseen network footholds, and malware attacks as a direct result of user error. With the capabilities of the
Kategorie: Hacking & Security

China-Linked Group Breaches Networks via Connectwise, F5 Software Flaws

22 Březen, 2024 - 12:28
A China-linked threat cluster leveraged security flaws in Connectwise ScreenConnect and F5 BIG-IP software to deliver custom malware capable of delivering additional backdoors on compromised Linux hosts as part of an "aggressive" campaign. Google-owned Mandiant is tracking the activity under its uncategorized moniker UNC5174 (aka Uteus or Uetus), describing it as a "former Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Implementing Zero Trust Controls for Compliance

22 Březen, 2024 - 12:28
The ThreatLocker® Zero Trust Endpoint Protection Platform implements a strict deny-by-default, allow-by-exception security posture to give organizations the ability to set policy-based controls within their environment and mitigate countless cyber threats, including zero-days, unseen network footholds, and malware attacks as a direct result of user error. With the capabilities of the The Hacker Newshttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Massive Sign1 Campaign Infects 39,000+ WordPress Sites with Scam Redirects

22 Březen, 2024 - 12:27
A massive malware campaign dubbed Sign1 has compromised over 39,000 WordPress sites in the last six months, using malicious JavaScript injections to redirect users to scam sites. The most recent variant of the malware is estimated to have infected no less than 2,500 sites over the past two months alone, Sucuri said in a report published this week. The attacks entail injecting rogue
Kategorie: Hacking & Security

Massive Sign1 Campaign Infects 39,000+ WordPress Sites with Scam Redirects

22 Březen, 2024 - 12:27
A massive malware campaign dubbed Sign1 has compromised over 39,000 WordPress sites in the last six months, using malicious JavaScript injections to redirect users to scam sites. The most recent variant of the malware is estimated to have infected no less than 2,500 sites over the past two months alone, Sucuri said in a report published this week. The attacks entail injecting rogue Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

U.S. Justice Department Sues Apple Over Monopoly and Messaging Security

22 Březen, 2024 - 07:14
The U.S. Department of Justice (DoJ), along with 16 other state and district attorneys general, on Thursday accused Apple of illegally maintaining a monopoly over smartphones, thereby undermining, among other things, the security and privacy of users when messaging non-iPhone users. "Apple wraps itself in a cloak of privacy, security, and consumer preferences to justify its
Kategorie: Hacking & Security

U.S. Justice Department Sues Apple Over Monopoly and Messaging Security

22 Březen, 2024 - 07:14
The U.S. Department of Justice (DoJ), along with 16 other state and district attorneys general, on Thursday accused Apple of illegally maintaining a monopoly over smartphones, thereby undermining, among other things, the security and privacy of users when messaging non-iPhone users. "Apple wraps itself in a cloak of privacy, security, and consumer preferences to justify its Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security