The Hacker News

Syndikovat obsah
The Hacker News has been internationally recognized as a leading news source dedicated to promoting awareness for security experts and [email protected]
Aktualizace: 28 min 59 sek zpět

AnyDesk Hacked: Popular Remote Desktop Software Mandates Password Reset

3 Únor, 2024 - 03:55
Remote desktop software maker AnyDesk disclosed on Friday that it suffered a cyber attack that led to a compromise of its production systems. The German company said the incident, which it discovered following a security audit, is not a ransomware attack and that it has notified relevant authorities. "We have revoked all security-related certificates and systems have been remediated or replaced
Kategorie: Hacking & Security

AnyDesk Hacked: Popular Remote Desktop Software Mandates Password Reset

3 Únor, 2024 - 03:55
Remote desktop software maker AnyDesk disclosed on Friday that it suffered a cyber attack that led to a compromise of its production systems. The German company said the incident, which it discovered following a security audit, is not a ransomware attack and that it has notified relevant authorities. "We have revoked all security-related certificates and systems have been remediated or replaced Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Russian APT28 Hackers Targeting High-Value Orgs with NTLM Relay Attacks

2 Únor, 2024 - 15:49
Russian state-sponsored actors have staged NT LAN Manager (NTLM) v2 hash relay attacks through various methods from April 2022 to November 2023, targeting high-value targets worldwide. The attacks, attributed to an "aggressive" hacking crew called APT28, have set their eyes on organizations dealing with foreign affairs, energy, defense, and transportation, as well as those involved with
Kategorie: Hacking & Security

Russian APT28 Hackers Targeting High-Value Orgs with NTLM Relay Attacks

2 Únor, 2024 - 15:49
Russian state-sponsored actors have staged NT LAN Manager (NTLM) v2 hash relay attacks through various methods from April 2022 to November 2023, targeting high-value targets worldwide. The attacks, attributed to an "aggressive" hacking crew called APT28, have set their eyes on organizations dealing with foreign affairs, energy, defense, and transportation, as well as those involved with Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

DirtyMoe Malware Infects 2,000+ Ukrainian Computers for DDoS and Cryptojacking

2 Únor, 2024 - 14:17
The Computer Emergency Response Team of Ukraine (CERT-UA) has warned that more than 2,000 computers in the country have been infected by a strain of malware called DirtyMoe. The agency attributed the campaign to a threat actor it calls UAC-0027. DirtyMoe, active since at least 2016, is capable of carrying out cryptojacking and distributed denial-of-service (DDoS) attacks. In March
Kategorie: Hacking & Security

DirtyMoe Malware Infects 2,000+ Ukrainian Computers for DDoS and Cryptojacking

2 Únor, 2024 - 14:17
The Computer Emergency Response Team of Ukraine (CERT-UA) has warned that more than 2,000 computers in the country have been infected by a strain of malware called DirtyMoe. The agency attributed the campaign to a threat actor it calls UAC-0027. DirtyMoe, active since at least 2016, is capable of carrying out cryptojacking and distributed denial-of-service (DDoS) attacks. In MarchNewsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Former CIA Engineer Sentenced to 40 Years for Leaking Classified Documents

2 Únor, 2024 - 11:40
A former software engineer with the U.S. Central Intelligence Agency (CIA) has been sentenced to 40 years in prison by the Southern District of New York (SDNY) for transmitting classified documents to WikiLeaks and for possessing child pornographic material. Joshua Adam Schulte, 35, was originally charged in June 2018. He was found guilty in July 2022. On September 13, 2023, he was&
Kategorie: Hacking & Security

Former CIA Engineer Sentenced to 40 Years for Leaking Classified Documents

2 Únor, 2024 - 11:40
A former software engineer with the U.S. Central Intelligence Agency (CIA) has been sentenced to 40 years in prison by the Southern District of New York (SDNY) for transmitting classified documents to WikiLeaks and for possessing child pornographic material. Joshua Adam Schulte, 35, was originally charged in June 2018. He was found guilty in July 2022. On September 13, 2023, he was&Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Cloudzy Elevates Cybersecurity: Integrating Insights from Recorded Future to Revolutionize Cloud Security

2 Únor, 2024 - 11:30
Cloudzy, a prominent cloud infrastructure provider, proudly announces a significant enhancement in its cybersecurity landscape. This breakthrough has been achieved through a recent consultation with Recorded Future, a leader in providing real-time threat intelligence and cybersecurity analytics. This initiative, coupled with an overhaul of Cloudzy's cybersecurity strategies, represents a major
Kategorie: Hacking & Security

Cloudzy Elevates Cybersecurity: Integrating Insights from Recorded Future to Revolutionize Cloud Security

2 Únor, 2024 - 11:30
Cloudzy, a prominent cloud infrastructure provider, proudly announces a significant enhancement in its cybersecurity landscape. This breakthrough has been achieved through a recent consultation with Recorded Future, a leader in providing real-time threat intelligence and cybersecurity analytics. This initiative, coupled with an overhaul of Cloudzy's cybersecurity strategies, represents a major The Hacker Newshttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

INTERPOL Arrests 31 in Global Operation, Identifies 1,900+ Ransomware-Linked IPs

2 Únor, 2024 - 11:23
An INTERPOL-led collaborative operation targeting phishing, banking malware, and ransomware attacks has led to the identification of 1,300 suspicious IP addresses and URLs. The law enforcement effort, codenamed Synergia, took place between September and November 2023 in an attempt to blunt the "growth, escalation and professionalization of transnational cybercrime." Involving 60 law
Kategorie: Hacking & Security

INTERPOL Arrests 31 in Global Operation, Identifies 1,900+ Ransomware-Linked IPs

2 Únor, 2024 - 11:23
An INTERPOL-led collaborative operation targeting phishing, banking malware, and ransomware attacks has led to the identification of 1,300 suspicious IP addresses and URLs. The law enforcement effort, codenamed Synergia, took place between September and November 2023 in an attempt to blunt the "growth, escalation and professionalization of transnational cybercrime." Involving 60 law Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Cloudflare Breach: Nation-State Hackers Access Source Code and Internal Docs

2 Únor, 2024 - 07:21
Cloudflare has revealed that it was the target of a likely nation-state attack in which the threat actor leveraged stolen credentials to gain unauthorized access to its Atlassian server and ultimately access some documentation and a limited amount of source code. The intrusion, which took place between November 14 and 24, 2023, and detected on November 23, was carried out "with the goal of
Kategorie: Hacking & Security

Cloudflare Breach: Nation-State Hackers Access Source Code and Internal Docs

2 Únor, 2024 - 07:21
Cloudflare has revealed that it was the target of a likely nation-state attack in which the threat actor leveraged stolen credentials to gain unauthorized access to its Atlassian server and ultimately access some documentation and a limited amount of source code. The intrusion, which took place between November 14 and 24, 2023, and detected on November 23, was carried out "with the goal of Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

FritzFrog Returns with Log4Shell and PwnKit, Spreading Malware Inside Your Network

1 Únor, 2024 - 16:44
The threat actor behind a peer-to-peer (P2P) botnet known as FritzFrog has made a return with a new variant that leverages the Log4Shell vulnerability to propagate internally within an already compromised network. "The vulnerability is exploited in a brute-force manner that attempts to target as many vulnerable Java applications as possible," web infrastructure and security
Kategorie: Hacking & Security

FritzFrog Returns with Log4Shell and PwnKit, Spreading Malware Inside Your Network

1 Únor, 2024 - 16:44
The threat actor behind a peer-to-peer (P2P) botnet known as FritzFrog has made a return with a new variant that leverages the Log4Shell vulnerability to propagate internally within an already compromised network. "The vulnerability is exploited in a brute-force manner that attempts to target as many vulnerable Java applications as possible," web infrastructure and security Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Exposed Docker APIs Under Attack in 'Commando Cat' Cryptojacking Campaign

1 Únor, 2024 - 14:36
Exposed Docker API endpoints over the internet are under assault from a sophisticated cryptojacking campaign called Commando Cat. "The campaign deploys a benign container generated using the Commando project," Cado security researchers Nate Bill and Matt Muir said in a new report published today. "The attacker escapes this container and runs multiple payloads on the
Kategorie: Hacking & Security

Exposed Docker APIs Under Attack in 'Commando Cat' Cryptojacking Campaign

1 Únor, 2024 - 14:36
Exposed Docker API endpoints over the internet are under assault from a sophisticated cryptojacking campaign called Commando Cat. "The campaign deploys a benign container generated using the Commando project," Cado security researchers Nate Bill and Matt Muir said in a new report published today. "The attacker escapes this container and runs multiple payloads on theNewsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Why the Right Metrics Matter When it Comes to Vulnerability Management

1 Únor, 2024 - 12:40
How’s your vulnerability management program doing? Is it effective? A success? Let’s be honest, without the right metrics or analytics, how can you tell how well you’re doing, progressing, or if you’re getting ROI? If you’re not measuring, how do you know it’s working? And even if you are measuring, faulty reporting or focusing on the wrong metrics can create blind spots and make it harder to
Kategorie: Hacking & Security

Why the Right Metrics Matter When it Comes to Vulnerability Management

1 Únor, 2024 - 12:40
How’s your vulnerability management program doing? Is it effective? A success? Let’s be honest, without the right metrics or analytics, how can you tell how well you’re doing, progressing, or if you’re getting ROI? If you’re not measuring, how do you know it’s working? And even if you are measuring, faulty reporting or focusing on the wrong metrics can create blind spots and make it harder to The Hacker Newshttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security