The Hacker News

Syndikovat obsah
The Hacker News has been internationally recognized as a leading news source dedicated to promoting awareness for security experts and [email protected]
Aktualizace: 23 min 44 sek zpět

PikaBot Resurfaces with Streamlined Code and Deceptive Tactics

13 Únor, 2024 - 15:07
The threat actors behind the PikaBot malware have made significant changes to the malware in what has been described as a case of "devolution." "Although it appears to be in a new development cycle and testing phase, the developers have reduced the complexity of the code by removing advanced obfuscation techniques and changing the network communications," Zscaler ThreatLabz researcher Nikolaos
Kategorie: Hacking & Security

PikaBot Resurfaces with Streamlined Code and Deceptive Tactics

13 Únor, 2024 - 15:07
The threat actors behind the PikaBot malware have made significant changes to the malware in what has been described as a case of "devolution." "Although it appears to be in a new development cycle and testing phase, the developers have reduced the complexity of the code by removing advanced obfuscation techniques and changing the network communications," Zscaler ThreatLabz researcher Nikolaos Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Midnight Blizzard and Cloudflare-Atlassian Cybersecurity Incidents: What to Know

13 Únor, 2024 - 12:10
The Midnight Blizzard and Cloudflare-Atlassian cybersecurity incidents raised alarms about the vulnerabilities inherent in major SaaS platforms. These incidents illustrate the stakes involved in SaaS breaches — safeguarding the integrity of SaaS apps and their sensitive data is critical but is not easy. Common threat vectors such as sophisticated spear-phishing, misconfigurations and
Kategorie: Hacking & Security

Midnight Blizzard and Cloudflare-Atlassian Cybersecurity Incidents: What to Know

13 Únor, 2024 - 12:10
The Midnight Blizzard and Cloudflare-Atlassian cybersecurity incidents raised alarms about the vulnerabilities inherent in major SaaS platforms. These incidents illustrate the stakes involved in SaaS breaches — safeguarding the integrity of SaaS apps and their sensitive data is critical but is not easy. Common threat vectors such as sophisticated spear-phishing, misconfigurations and The Hacker Newshttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Ivanti Vulnerability Exploited to Install 'DSLog' Backdoor on 670+ IT Infrastructures

13 Únor, 2024 - 08:03
Threat actors are leveraging a recently disclosed security flaw impacting Ivanti Connect Secure, Policy Secure, and ZTA gateways to deploy a backdoor codenamed DSLog on susceptible devices. That's according to findings from Orange Cyberdefense, which said it observed the exploitation of CVE-2024-21893 within hours of the public release of the proof-the-concept (PoC) code.
Kategorie: Hacking & Security

Ivanti Vulnerability Exploited to Install 'DSLog' Backdoor on 670+ IT Infrastructures

13 Únor, 2024 - 08:03
Threat actors are leveraging a recently disclosed security flaw impacting Ivanti Connect Secure, Policy Secure, and ZTA gateways to deploy a backdoor codenamed DSLog on susceptible devices. That's according to findings from Orange Cyberdefense, which said it observed the exploitation of CVE-2024-21893 within hours of the public release of the proof-the-concept (PoC) code. Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Alert: CISA Warns of Active 'Roundcube' Email Attacks - Patch Now

13 Únor, 2024 - 05:51
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a medium-severity security flaw impacting Roundcube email software to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The issue, tracked as CVE-2023-43770 (CVSS score: 6.1), relates to a cross-site scripting (XSS) flaw that stems from the handling of
Kategorie: Hacking & Security

Alert: CISA Warns of Active 'Roundcube' Email Attacks - Patch Now

13 Únor, 2024 - 05:51
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a medium-severity security flaw impacting Roundcube email software to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The issue, tracked as CVE-2023-43770 (CVSS score: 6.1), relates to a cross-site scripting (XSS) flaw that stems from the handling of Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Rhysida Ransomware Cracked, Free Decryption Tool Released

12 Únor, 2024 - 14:12
Cybersecurity researchers have uncovered an "implementation vulnerability" that has made it possible to reconstruct encryption keys and decrypt data locked by Rhysida ransomware. The findings were published last week by a group of researchers from Kookmin University and the Korea Internet and Security Agency (KISA). "Through a comprehensive analysis of Rhysida Ransomware, we identified an
Kategorie: Hacking & Security

Rhysida Ransomware Cracked, Free Decryption Tool Released

12 Únor, 2024 - 14:12
Cybersecurity researchers have uncovered an "implementation vulnerability" that has made it possible to reconstruct encryption keys and decrypt data locked by Rhysida ransomware. The findings were published last week by a group of researchers from Kookmin University and the Korea Internet and Security Agency (KISA). "Through a comprehensive analysis of Rhysida Ransomware, we identified an Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

4 Ways Hackers use Social Engineering to Bypass MFA

12 Únor, 2024 - 12:14
When it comes to access security, one recommendation stands out above the rest: multi-factor authentication (MFA). With passwords alone being simple work for hackers, MFA provides an essential layer of protection against breaches. However, it's important to remember that MFA isn't foolproof. It can be bypassed, and it often is.  If a password is compromised, there are several options
Kategorie: Hacking & Security

4 Ways Hackers use Social Engineering to Bypass MFA

12 Únor, 2024 - 12:14
When it comes to access security, one recommendation stands out above the rest: multi-factor authentication (MFA). With passwords alone being simple work for hackers, MFA provides an essential layer of protection against breaches. However, it's important to remember that MFA isn't foolproof. It can be bypassed, and it often is.  If a password is compromised, there are several options The Hacker Newshttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

CISA and OpenSSF Release Framework for Package Repository Security

12 Únor, 2024 - 11:41
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) announced that it's partnering with the Open Source Security Foundation (OpenSSF) Securing Software Repositories Working Group to publish a new framework to secure package repositories. Called the Principles for Package Repository Security, the framework aims to establish a set of foundational rules for package
Kategorie: Hacking & Security

CISA and OpenSSF Release Framework for Package Repository Security

12 Únor, 2024 - 11:41
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) announced that it's partnering with the Open Source Security Foundation (OpenSSF) Securing Software Repositories Working Group to publish a new framework to secure package repositories. Called the Principles for Package Repository Security, the framework aims to establish a set of foundational rules for package The Hacker Newshttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Why Are Compromised Identities the Nightmare to IR Speed and Efficiency?

12 Únor, 2024 - 11:00
Incident response (IR) is a race against time. You engage your internal or external team because there's enough evidence that something bad is happening, but you’re still blind to the scope, the impact, and the root cause. The common set of IR tools and practices provides IR teams with the ability to discover malicious files and outbound network connections. However, the identity aspect - namely
Kategorie: Hacking & Security

Why Are Compromised Identities the Nightmare to IR Speed and Efficiency?

12 Únor, 2024 - 11:00
Incident response (IR) is a race against time. You engage your internal or external team because there's enough evidence that something bad is happening, but you’re still blind to the scope, the impact, and the root cause. The common set of IR tools and practices provides IR teams with the ability to discover malicious files and outbound network connections. However, the identity aspect - namelyThe Hacker Newshttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Microsoft Introduces Linux-Like 'sudo' Command to Windows 11

12 Únor, 2024 - 06:45
Microsoft said it's introducing Sudo for Windows 11 as part of an early preview version to help users execute commands with administrator privileges. "Sudo for Windows is a new way for users to run elevated commands directly from an unelevated console session," Microsoft Product Manager Jordi Adoumie said. "It is an ergonomic and familiar solution for users who want to elevate a command
Kategorie: Hacking & Security

Microsoft Introduces Linux-Like 'sudo' Command to Windows 11

12 Únor, 2024 - 06:45
Microsoft said it's introducing Sudo for Windows 11 as part of an early preview version to help users execute commands with administrator privileges. "Sudo for Windows is a new way for users to run elevated commands directly from an unelevated console session," Microsoft Product Manager Jordi Adoumie said. "It is an ergonomic and familiar solution for users who want to elevate a command Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

U.S. Offers $10 Million Bounty for Info Leading to Arrest of Hive Ransomware Leaders

12 Únor, 2024 - 05:31
The U.S. Department of State has announced monetary rewards of up to $10 million for information about individuals holding key positions within the Hive ransomware operation. It is also giving away an additional $5 million for specifics that could lead to the arrest and/or conviction of any person "conspiring to participate in or attempting to participate in Hive ransomware activity."
Kategorie: Hacking & Security

U.S. Offers $10 Million Bounty for Info Leading to Arrest of Hive Ransomware Leaders

12 Únor, 2024 - 05:31
The U.S. Department of State has announced monetary rewards of up to $10 million for information about individuals holding key positions within the Hive ransomware operation. It is also giving away an additional $5 million for specifics that could lead to the arrest and/or conviction of any person "conspiring to participate in or attempting to participate in Hive ransomware activity." Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security