The Hacker News

Syndikovat obsah
The Hacker News has been internationally recognized as a leading news source dedicated to promoting awareness for security experts and [email protected]
Aktualizace: 4 min 59 sek zpět

New Wave of JSOutProx Malware Targeting Financial Firms in APAC and MENA

5 Duben, 2024 - 09:48
Financial organizations in the Asia-Pacific (APAC) and Middle East and North Africa (MENA) are being targeted by a new version of an "evolving threat" called JSOutProx. "JSOutProx is a sophisticated attack framework utilizing both JavaScript and .NET," Resecurity said in a technical report published this week. "It employs the .NET (de)serialization feature to interact with a core
Kategorie: Hacking & Security

New Wave of JSOutProx Malware Targeting Financial Firms in APAC and MENA

5 Duben, 2024 - 09:48
Financial organizations in the Asia-Pacific (APAC) and Middle East and North Africa (MENA) are being targeted by a new version of an "evolving threat" called JSOutProx. "JSOutProx is a sophisticated attack framework utilizing both JavaScript and .NET," Resecurity said in a technical report published this week. "It employs the .NET (de)serialization feature to interact with a core Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Researchers Identify Multiple China Hacker Groups Exploiting Ivanti Security Flaws

5 Duben, 2024 - 09:15
Multiple China-nexus threat actors have been linked to the zero-day exploitation of three security flaws impacting Ivanti appliances (CVE-2023-46805, CVE-2024-21887, and CVE-2024-21893). The clusters are being tracked by Mandiant under the uncategorized monikers UNC5221, UNC5266, UNC5291, UNC5325, UNC5330, and UNC5337. Also previously linked to the exploitation spree is a Chinese
Kategorie: Hacking & Security

Researchers Identify Multiple China Hacker Groups Exploiting Ivanti Security Flaws

5 Duben, 2024 - 09:15
Multiple China-nexus threat actors have been linked to the zero-day exploitation of three security flaws impacting Ivanti appliances (CVE-2023-46805, CVE-2024-21887, and CVE-2024-21893). The clusters are being tracked by Mandiant under the uncategorized monikers UNC5221, UNC5266, UNC5291, UNC5325, UNC5330, and UNC5337. Also previously linked to the exploitation spree is a Chinese Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Vietnam-Based Hackers Steal Financial Data Across Asia with Malware

4 Duben, 2024 - 17:42
A suspected Vietnamese-origin threat actor has been observed targeting victims in several Asian and Southeast Asian countries with malware designed to harvest valuable data since at least May 2023. Cisco Talos is tracking the cluster under the name CoralRaider, describing it as financially motivated. Targets of the campaign include India, China, South Korea, Bangladesh, Pakistan, Indonesia,
Kategorie: Hacking & Security

Vietnam-Based Hackers Steal Financial Data Across Asia with Malware

4 Duben, 2024 - 17:42
A suspected Vietnamese-origin threat actor has been observed targeting victims in several Asian and Southeast Asian countries with malware designed to harvest valuable data since at least May 2023. Cisco Talos is tracking the cluster under the name CoralRaider, describing it as financially motivated. Targets of the campaign include India, China, South Korea, Bangladesh, Pakistan, Indonesia,Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

New Phishing Campaign Targets Oil & Gas with Evolved Data-Stealing Malware

4 Duben, 2024 - 17:30
An updated version of an information-stealing malware called Rhadamanthys is being used in phishing campaigns targeting the oil and gas sector. "The phishing emails use a unique vehicle incident lure and, in later stages of the infection chain, spoof the Federal Bureau of Transportation in a PDF that mentions a significant fine for the incident," Cofense researcher Dylan Duncan said. The
Kategorie: Hacking & Security

New Phishing Campaign Targets Oil & Gas with Evolved Data-Stealing Malware

4 Duben, 2024 - 17:30
An updated version of an information-stealing malware called Rhadamanthys is being used in phishing campaigns targeting the oil and gas sector. "The phishing emails use a unique vehicle incident lure and, in later stages of the infection chain, spoof the Federal Bureau of Transportation in a PDF that mentions a significant fine for the incident," Cofense researcher Dylan Duncan said. The Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Considerations for Operational Technology Cybersecurity

4 Duben, 2024 - 13:27
Operational Technology (OT) refers to the hardware and software used to change, monitor, or control the enterprise's physical devices, processes, and events. Unlike traditional Information Technology (IT) systems, OT systems directly impact the physical world. This unique characteristic of OT brings additional cybersecurity considerations not typically present in conventional IT security
Kategorie: Hacking & Security

Considerations for Operational Technology Cybersecurity

4 Duben, 2024 - 13:27
Operational Technology (OT) refers to the hardware and software used to change, monitor, or control the enterprise's physical devices, processes, and events. Unlike traditional Information Technology (IT) systems, OT systems directly impact the physical world. This unique characteristic of OT brings additional cybersecurity considerations not typically present in conventional IT security The Hacker Newshttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

New HTTP/2 Vulnerability Exposes Web Servers to DoS Attacks

4 Duben, 2024 - 13:15
New research has found that the CONTINUATION frame in the HTTP/2 protocol can be exploited to conduct denial-of-service (DoS) attacks. The technique has been codenamed HTTP/2 CONTINUATION Flood by security researcher Bartek Nowotarski, who reported the issue to the CERT Coordination Center (CERT/CC) on January 25, 2024. "Many HTTP/2 implementations do not properly limit or sanitize the
Kategorie: Hacking & Security

New HTTP/2 Vulnerability Exposes Web Servers to DoS Attacks

4 Duben, 2024 - 13:15
New research has found that the CONTINUATION frame in the HTTP/2 protocol can be exploited to conduct denial-of-service (DoS) attacks. The technique has been codenamed HTTP/2 CONTINUATION Flood by security researcher Bartek Nowotarski, who reported the issue to the CERT Coordination Center (CERT/CC) on January 25, 2024. "Many HTTP/2 implementations do not properly limit or sanitize theNewsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Ivanti Rushes Patches for 4 New Flaws in Connect Secure and Policy Secure

4 Duben, 2024 - 06:45
Ivanti has released security updates to address four security flaws impacting Connect Secure and Policy Secure Gateways that could result in code execution and denial-of-service (DoS). The list of flaws is as follows - CVE-2024-21894 (CVSS score: 8.2) - A heap overflow vulnerability in the IPSec component of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure allows an
Kategorie: Hacking & Security

Ivanti Rushes Patches for 4 New Flaws in Connect Secure and Policy Secure

4 Duben, 2024 - 06:45
Ivanti has released security updates to address four security flaws impacting Connect Secure and Policy Secure Gateways that could result in code execution and denial-of-service (DoS). The list of flaws is as follows - CVE-2024-21894 (CVSS score: 8.2) - A heap overflow vulnerability in the IPSec component of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure allows an Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Google Warns: Android Zero-Day Flaws in Pixel Phones Exploited by Forensic Companies

3 Duben, 2024 - 18:10
Google has disclosed that two Android security flaws impacting its Pixel smartphones have been exploited in the wild by forensic companies. The high-severity zero-day vulnerabilities are as follows - CVE-2024-29745 - An information disclosure flaw in the bootloader component CVE-2024-29748 - A privilege escalation flaw in the firmware component "There are indications that the [
Kategorie: Hacking & Security

Google Warns: Android Zero-Day Flaws in Pixel Phones Exploited by Forensic Companies

3 Duben, 2024 - 18:10
Google has disclosed that two Android security flaws impacting its Pixel smartphones have been exploited in the wild by forensic companies. The high-severity zero-day vulnerabilities are as follows - CVE-2024-29745 - An information disclosure flaw in the bootloader component CVE-2024-29748 - A privilege escalation flaw in the firmware component "There are indications that the [Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

U.S. Cyber Safety Board Slams Microsoft Over Breach by China-Based Hackers

3 Duben, 2024 - 17:32
The U.S. Cyber Safety Review Board (CSRB) has criticized Microsoft for a series of security lapses that led to the breach of nearly two dozen companies across Europe and the U.S. by a China-based nation-state group called Storm-0558 last year. The findings, released by the Department of Homeland Security (DHS) on Tuesday, found that the intrusion was preventable, and that it became successful
Kategorie: Hacking & Security

U.S. Cyber Safety Board Slams Microsoft Over Breach by China-Based Hackers

3 Duben, 2024 - 17:32
The U.S. Cyber Safety Review Board (CSRB) has criticized Microsoft for a series of security lapses that led to the breach of nearly two dozen companies across Europe and the U.S. by a China-based nation-state group called Storm-0558 last year. The findings, released by the Department of Homeland Security (DHS) on Tuesday, found that the intrusion was preventable, and that it became successful Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Google Chrome Beta Tests New DBSC Protection Against Cookie-Stealing Attacks

3 Duben, 2024 - 15:07
Google on Tuesday said it's piloting a new feature in Chrome called Device Bound Session Credentials (DBSC) to help protect users against session cookie theft by malware. The prototype – currently tested against "some" Google Account users running Chrome Beta – is built with an aim to make it an open web standard, the tech giant's Chromium team said. "By binding authentication sessions to the
Kategorie: Hacking & Security

Google Chrome Beta Tests New DBSC Protection Against Cookie-Stealing Attacks

3 Duben, 2024 - 15:07
Google on Tuesday said it's piloting a new feature in Chrome called Device Bound Session Credentials (DBSC) to help protect users against session cookie theft by malware. The prototype – currently tested against "some" Google Account users running Chrome Beta – is built with an aim to make it an open web standard, the tech giant's Chromium team said. "By binding authentication sessions to the Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security