FreshRSS

🔒
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
☐ ☆ ✇ The Hacker News

CLR SqlShell Malware Targets MS SQL Servers for Crypto Mining and Ransomware

By: Ravie Lakshmanan — May 15th 2023 at 07:16
Poorly managed Microsoft SQL (MS SQL) servers are the target of a new campaign that's designed to propagate a category of malware called CLR SqlShell that ultimately facilitates the deployment of cryptocurrency miners and ransomware. "Similar to web shell, which can be installed on web servers, SqlShell is a malware strain that supports various features after being installed on an MS SQL server,
☐ ☆ ✇ The Hacker News

Former Ubiquiti Employee Gets 6 Years in Jail for $2 Million Crypto Extortion Case

By: Ravie Lakshmanan — May 15th 2023 at 06:59
A former employee of Ubiquiti has been sentenced to six years in jail after he pleaded guilty to posing as an anonymous hacker and a whistleblower in an attempt to extort almost $2 million worth of cryptocurrency while working at the company. Nickolas Sharp, 37, was arrested in December 2021 for using his insider access as a senior developer to steal confidential data and sending an anonymous
☐ ☆ ✇ The Hacker News

New Phishing-as-a-Service Platform Lets Cybercriminals Generate Convincing Phishing Pages

By: Ravie Lakshmanan — May 13th 2023 at 07:45
A new phishing-as-a-service (PhaaS or PaaS) platform named Greatness has been leveraged by cybercriminals to target business users of the Microsoft 365 cloud service since at least mid-2022, effectively lowering the bar to entry for phishing attacks. "Greatness, for now, is only focused on Microsoft 365 phishing pages, providing its affiliates with an attachment and link builder that creates
☐ ☆ ✇ The Hacker News

XWorm Malware Exploits Follina Vulnerability in New Wave of Attacks

By: Ravie Lakshmanan — May 12th 2023 at 21:00
Cybersecurity researchers have discovered an ongoing phishing campaign that makes use of a unique attack chain to deliver the XWorm malware on targeted systems. Securonix, which is tracking the activity cluster under the name MEME#4CHAN, said some of the attacks have primarily targeted manufacturing firms and healthcare clinics located in Germany. "The attack campaign has been leveraging rather
☐ ☆ ✇ The Hacker News

Netgear Routers' Flaws Expose Users to Malware, Remote Attacks, and Surveillance

By: Ravie Lakshmanan — May 12th 2023 at 14:16
As many as five security flaws have been disclosed in Netgear RAX30 routers that could be chained to bypass authentication and achieve remote code execution. "Successful exploits could allow attackers to monitor users' internet activity, hijack internet connections, and redirect traffic to malicious websites or inject malware into network traffic," Claroty security researcher Uri Katz said in a
☐ ☆ ✇ The Hacker News

New Stealthy Variant of Linux Backdoor BPFDoor Emerges from the Shadows

By: Ravie Lakshmanan — May 12th 2023 at 13:24
A previously undocumented and mostly undetected variant of a Linux backdoor called BPFDoor has been spotted in the wild, cybersecurity firm Deep Instinct said in a technical report published this week. "BPFDoor retains its reputation as an extremely stealthy and difficult-to-detect malware with this latest iteration," security researchers Shaul Vilkomir-Preisman and Eliran Nissan said. BPFDoor (
☐ ☆ ✇ The Hacker News

Solving Your Teams Secure Collaboration Challenges

By: The Hacker News — May 12th 2023 at 11:33
In today's interconnected world, where organisations regularly exchange sensitive information with customers, partners and employees, secure collaboration has become increasingly vital. However, collaboration can pose a security risk if not managed properly. To ensure that collaboration remains secure, organisations need to take steps to protect their data. Since collaborating is essential for
☐ ☆ ✇ The Hacker News

Bl00dy Ransomware Gang Strikes Education Sector with Critical PaperCut Vulnerability

By: Ravie Lakshmanan — May 12th 2023 at 07:59
U.S. cybersecurity and intelligence agencies have warned of attacks carried out by a threat actor known as the Bl00dy Ransomware Gang that attempt to exploit vulnerable PaperCut servers against the education facilities sector in the country. The attacks took place in early May 2023, the Federal Bureau of Investigation (FBI) and Cybersecurity and Infrastructure Security Agency (CISA) said in a
☐ ☆ ✇ The Hacker News

New Flaw in WordPress Plugin Used by Over a Million Sites Under Active Exploitation

By: Ravie Lakshmanan — May 12th 2023 at 05:43
A security vulnerability has been disclosed in the popular WordPress plugin Essential Addons for Elementor that could be potentially exploited to achieve elevated privileges on affected sites. The issue, tracked as CVE-2023-32243, has been addressed by the plugin maintainers in version 5.7.2 that was shipped on May 11, 2023. Essential Addons for Elementor has over one million active
☐ ☆ ✇ The Hacker News

New APT Group Red Stinger Targets Military and Critical Infrastructure in Eastern Europe

By: Ravie Lakshmanan — May 11th 2023 at 14:45
A previously undetected advanced persistent threat (APT) actor dubbed Red Stinger has been linked to attacks targeting Eastern Europe since 2020. "Military, transportation, and critical infrastructure were some of the entities being targeted, as well as some involved in the September East Ukraine referendums," Malwarebytes disclosed in a report published today. "Depending on the campaign,
☐ ☆ ✇ The Hacker News

Spanish Police Takes Down Massive Cybercrime Ring, 40 Arrested

By: Ravie Lakshmanan — May 11th 2023 at 14:00
The National Police of Spain said it arrested 40 individuals for their alleged involvement in an organized crime gang called Trinitarians. Among those apprehended include two hackers who carried out bank scams through phishing and smishing techniques and 15 other members of the crime syndicate, who have all been charged with a number of offenses such as bank fraud, document forgery, identity
☐ ☆ ✇ The Hacker News

How Attack Surface Management Supports Continuous Threat Exposure Management

By: The Hacker News — May 11th 2023 at 10:32
According to Forrester, External Attack Surface Management (EASM) emerged as a market category in 2021 and gained popularity in 2022. In a different report, Gartner concluded that vulnerability management vendors are expanding their offerings to include Attack Surface Management (ASM) for a suite of comprehensive offensive security solutions. Recognition from global analysts has officially put
☐ ☆ ✇ The Hacker News

Babuk Source Code Sparks 9 Different Ransomware Strains Targeting VMware ESXi Systems

By: Ravie Lakshmanan — May 11th 2023 at 10:32
Multiple threat actors have capitalized on the leak of Babuk (aka Babak or Babyk) ransomware code in September 2021 to build as many as nine different ransomware families capable of targeting VMware ESXi systems. "These variants emerged through H2 2022 and H1 2023, which shows an increasing trend of Babuk source code adoption," SentinelOne security researcher Alex Delamotte said in a report
☐ ☆ ✇ The Hacker News

Andoryu Botnet Exploits Critical Ruckus Wireless Flaw for Widespread Attack

By: Ravie Lakshmanan — May 11th 2023 at 07:05
A nascent botnet called Andoryu has been found to exploit a now-patched critical security flaw in the Ruckus Wireless Admin panel to break into vulnerable devices. The flaw, tracked as CVE-2023-25717 (CVSS score: 9.8), stems from improper handling of HTTP requests, leading to unauthenticated remote code execution and a complete compromise of wireless Access Point (AP) equipment. Andoryu was 
☐ ☆ ✇ The Hacker News

Twitter Finally Rolling Out Encrypted Direct Messages — Starting with Verified Users

By: Ravie Lakshmanan — May 11th 2023 at 05:31
Twitter is officially beginning to roll out support for encrypted direct messages (DMs) on the platform, more than five months after its chief executive Elon Musk confirmed plans for the feature in November 2022. The "Phase 1" of the initiative will appear as separate conversations alongside existing direct messages on users' inboxes. Encrypted chats carry a lock icon badge to visually
☐ ☆ ✇ The Hacker News

GitHub Extends Push Protection to Prevent Accidental Leaks of Keys and Other Secrets

By: Ravie Lakshmanan — May 11th 2023 at 05:01
GitHub has announced the general availability of a new security feature called push protection, which aims to prevent developers from inadvertently leaking keys and other secrets in their code. The Microsoft-owned cloud-based repository hosting platform, which began testing the feature a year ago, said it's also extending push protection to all public repositories at no extra cost. The
☐ ☆ ✇ The Hacker News

Google Announces New Privacy, Safety, and Security Features Across Its Services

By: Ravie Lakshmanan — May 10th 2023 at 18:31
Google unveiled a slew of new privacy, safety, and security features today at its annual developer conference, Google I/O. The tech giant's latest initiatives are aimed at protecting its users from cyber threats, including phishing attacks and malicious websites, while providing more control and transparency over their personal data. Here is a short list of the newly introduced features -
☐ ☆ ✇ The Hacker News

Experts Detail New Zero-Click Windows Vulnerability for NTLM Credential Theft

By: Ravie Lakshmanan — May 10th 2023 at 14:23
Cybersecurity researchers have shared details about a now-patched security flaw in Windows MSHTML platform that could be abused to bypass integrity protections on targeted machines. The vulnerability, tracked as CVE-2023-29324 (CVSS score: 6.5), has been described as a security feature bypass. It was addressed by Microsoft as part of its Patch Tuesday updates for May 2023. Akamai security
☐ ☆ ✇ The Hacker News

Sophisticated DownEx Malware Campaign Targeting Central Asian Governments

By: Ravie Lakshmanan — May 10th 2023 at 13:05
Government organizations in Central Asia are the target of a sophisticated espionage campaign that leverages a previously undocumented strain of malware dubbed DownEx. Bitdefender, in a report shared with The Hacker News, said the activity remains active, with evidence likely pointing to the involvement of Russia-based threat actors. The Romanian cybersecurity firm said it first detected the
☐ ☆ ✇ The Hacker News

Why Honeytokens Are the Future of Intrusion Detection

By: The Hacker News — May 10th 2023 at 11:15
A few weeks ago, the 32nd edition of RSA, one of the world's largest cybersecurity conferences, wrapped up in San Francisco. Among the highlights, Kevin Mandia, CEO of Mandiant at Google Cloud, presented a retrospective on the state of cybersecurity. During his keynote, Mandia stated: "There are clear steps organizations can take beyond common safeguards and security tools to strengthen their
☐ ☆ ✇ The Hacker News

Mastermind Behind Twitter 2020 Hack Pleads Guilty and Faces up to 70 Years in Prison

By: Ravie Lakshmanan — May 10th 2023 at 10:50
A U.K. national has pleaded guilty in the U.S. in connection with the July 2020 Twitter attack affecting numerous high-profile accounts and defrauding other users of the platform. Joseph James O'Connor, who also went by the online alias PlugwalkJoe, admitted to "his role in cyberstalking and multiple schemes that involve computer hacking, including the July 2020 hack of Twitter," the U.S.
☐ ☆ ✇ The Hacker News

U.S. Government Neutralizes Russia's Most Sophisticated Snake Cyber Espionage Tool

By: Ravie Lakshmanan — May 10th 2023 at 08:44
The U.S. government on Tuesday announced the court-authorized disruption of a global network compromised by an advanced malware strain known as Snake wielded by Russia's Federal Security Service (FSB). Snake, dubbed the "most sophisticated cyber espionage tool," is the handiwork of a Russian state-sponsored group called Turla (aka Iron Hunter, Secret Blizzard, SUMMIT, Uroburos, Venomous Bear,
☐ ☆ ✇ The Hacker News

Microsoft's May Patch Tuesday Fixes 38 Flaws, Including 2 Exploited Zero-Day Bugs

By: Ravie Lakshmanan — May 10th 2023 at 05:34
Microsoft has rolled out Patch Tuesday updates for May 2023 to address 38 security flaws, including two zero-day bugs that it said is being actively exploited in the wild. Trend Micro's Zero Day Initiative (ZDI) said the volume is the lowest since August 2021, although it pointed out that "this number is expected to rise in the coming months." Of the 38 vulnerabilities, six are rated Critical
☐ ☆ ✇ The Hacker News

U.S. Authorities Seize 13 Domains Offering Criminal DDoS-for-Hire Services

By: Ravie Lakshmanan — May 9th 2023 at 16:57
U.S. authorities have announced the seizure of 13 internet domains that offered DDoS-for-hire services to other criminal actors. The takedown is part of an ongoing international initiative dubbed Operation PowerOFF that's aimed at dismantling criminal DDoS-for-hire infrastructures worldwide. The development comes almost five months after a "sweep" in December 2022 dismantled 48 similar services 
☐ ☆ ✇ The Hacker News

Operation ChattyGoblin: Hackers Targeting Gambling Firms via Chat Apps

By: Ravie Lakshmanan — May 9th 2023 at 13:29
A gambling company in the Philippines was the target of a China-aligned threat actor as part of a campaign that has been ongoing since October 2021. Slovak cybersecurity firm ESET is tracking the series of attacks against Southeast Asian gambling companies under the name Operation ChattyGoblin. "These attacks use a specific tactic: targeting the victim companies' support agents via chat
☐ ☆ ✇ The Hacker News

Product Security: Harnessing the Collective Experience and Collaborative Tools in DevSecOps

By: The Hacker News — May 9th 2023 at 12:54
In the fast-paced cybersecurity landscape, product security takes center stage. DevSecOps swoops in, seamlessly merging security practices into DevOps, empowering teams to tackle challenges. Let's dive into DevSecOps and explore how collaboration can give your team the edge to fight cyber villains. Application security and product security Regrettably, application security teams often intervene
☐ ☆ ✇ The Hacker News

Researchers Uncover SideWinder's Latest Server-Based Polymorphism Technique

By: Ravie Lakshmanan — May 9th 2023 at 09:39
The advanced persistent threat (APT) actor known as SideWinder has been accused of deploying a backdoor in attacks directed against Pakistan government organizations as part of a campaign that commenced in late November 2022. "In this campaign, the SideWinder advanced persistent threat (APT) group used a server-based polymorphism technique to deliver the next stage payload," the BlackBerry
☐ ☆ ✇ The Hacker News

Microsoft Warns of State-Sponsored Attacks Exploiting Critical PaperCut Vulnerability

By: Ravie Lakshmanan — May 9th 2023 at 08:53
Iranian nation-state groups have now joined financially motivated actors in actively exploiting a critical flaw in PaperCut print management software, Microsoft disclosed over the weekend. The tech giant's threat intelligence team said it observed both Mango Sandstorm (Mercury) and Mint Sandstorm (Phosphorus) weaponizing CVE-2023-27350 in their operations to achieve initial access. "This
☐ ☆ ✇ The Hacker News

New Ransomware Strain 'CACTUS' Exploits VPN Flaws to Infiltrate Networks

By: Ravie Lakshmanan — May 9th 2023 at 05:48
Cybersecurity researchers have shed light on a new ransomware strain called CACTUS that has been found to leverage known flaws in VPN appliances to obtain initial access to targeted networks. "Once inside the network, CACTUS actors attempt to enumerate local and network user accounts in addition to reachable endpoints before creating new user accounts and leveraging custom scripts to automate
☐ ☆ ✇ The Hacker News

MSI Data Breach: Private Code Signing Keys Leaked on the Dark Web

By: Ravie Lakshmanan — May 8th 2023 at 15:23
The threat actors behind the ransomware attack on Taiwanese PC maker MSI last month have leaked the company's private code signing keys on their dark website. "Confirmed, Intel OEM private key leaked, causing an impact on the entire ecosystem," Alex Matrosov, founder and CEO of firmware security firm Binarly, said in a tweet over the weekend. "It appears that Intel Boot Guard may not be
☐ ☆ ✇ The Hacker News

Western Digital Confirms Customer Data Stolen by Hackers in March Breach

By: Ravie Lakshmanan — May 8th 2023 at 14:06
Digital storage giant Western Digital confirmed that an "unauthorized third party" gained access to its systems and stole personal information belonging to the company's online store customers. "This information included customer names, billing and shipping addresses, email addresses and telephone numbers," the San Jose-based company said in a disclosure last week. "In addition, the database
☐ ☆ ✇ The Hacker News

Join Our Webinar: Learn How to Defeat Ransomware with Identity-Focused Protection

By: The Hacker News — May 8th 2023 at 13:31
Are you concerned about ransomware attacks? You're not alone. In recent years, these attacks have become increasingly common and can cause significant damage to organizations of all sizes. But there's good news - with the right security measures in place, such as real-time MFA and service account protection, you can effectively protect yourself against these types of attacks. That's why we're
☐ ☆ ✇ The Hacker News

SideCopy Using Action RAT and AllaKore RAT to infiltrate Indian Organizations

By: Ravie Lakshmanan — May 8th 2023 at 13:27
The suspected Pakistan-aligned threat actor known as SideCopy has been observed leveraging themes related to the Indian military research organization as part of an ongoing phishing campaign. This involves using a ZIP archive lure pertaining to India's Defence Research and Development Organization (DRDO) to deliver a malicious payload capable of harvesting sensitive information, Fortinet
☐ ☆ ✇ The Hacker News

How to Set Up a Threat Hunting and Threat Intelligence Program

By: The Hacker News — May 8th 2023 at 11:49
Threat hunting is an essential component of your cybersecurity strategy. Whether you're getting started or in an advanced state, this article will help you ramp up your threat intelligence program. What is Threat Hunting? The cybersecurity industry is shifting from a reactive to a proactive approach. Instead of waiting for cybersecurity alerts and then addressing them, security organizations are
☐ ☆ ✇ The Hacker News

CERT-UA Warns of SmokeLoader and RoarBAT Malware Attacks Against Ukraine

By: Ravie Lakshmanan — May 8th 2023 at 06:10
An ongoing phishing campaign with invoice-themed lures is being used to distribute the SmokeLoader malware in the form of a polyglot file, according to the Computer Emergency Response Team of Ukraine (CERT-UA). The emails, per the agency, are sent using compromised accounts and come with a ZIP archive that, in reality, is a polyglot file containing a decoy document and a JavaScript file. The
☐ ☆ ✇ The Hacker News

Dragon Breath APT Group Using Double-Clean-App Technique to Target Gambling Industry

By: Ravie Lakshmanan — May 6th 2023 at 11:24
An advanced persistent threat (APT) actor known as Dragon Breath has been observed adding new layers of complexity to its attacks by adopting a novel DLL side-loading mechanism. "The attack is based on a classic side-loading attack, consisting of a clean application, a malicious loader, and an encrypted payload, with various modifications made to these components over time," Sophos researcher
☐ ☆ ✇ The Hacker News

New Vulnerability in Popular WordPress Plugin Exposes Over 2 Million Sites to Cyberattacks

By: Ravie Lakshmanan — May 6th 2023 at 05:41
Users of Advanced Custom Fields plugin for WordPress are being urged to update version 6.1.6 following the discovery of a security flaw. The issue, assigned the identifier CVE-2023-30777, relates to a case of reflected cross-site scripting (XSS) that could be abused to inject arbitrary executable scripts into otherwise benign websites. The plugin, which is available both as a free and pro
☐ ☆ ✇ The Hacker News

New Android Malware 'FluHorse' Targeting East Asian Markets with Deceptive Tactics

By: Ravie Lakshmanan — May 5th 2023 at 13:47
Various sectors in East Asian markets have been subjected to a new email phishing campaign that distributes a previously undocumented strain of Android malware called FluHorse that abuses the Flutter software development framework. "The malware features several malicious Android applications that mimic legitimate applications, most of which have more than 1,000,000 installs," Check Point said in
☐ ☆ ✇ The Hacker News

Hackers Targeting Italian Corporate Banking Clients with New Web-Inject Toolkit DrIBAN

By: Ravie Lakshmanan — May 5th 2023 at 11:49
Italian corporate banking clients are the target of an ongoing financial fraud campaign that has been leveraging a new web-inject toolkit called drIBAN since at least 2019. "The main goal of drIBAN fraud operations is to infect Windows workstations inside corporate environments trying to alter legitimate banking transfers performed by the victims by changing the beneficiary and transferring
☐ ☆ ✇ The Hacker News

N. Korean Kimsuky Hackers Using New Recon Tool ReconShark in Latest Cyberattacks

By: Ravie Lakshmanan — May 5th 2023 at 10:19
The North Korean state-sponsored threat actor known as Kimsuky has been discovered using a new reconnaissance tool called ReconShark as part of an ongoing global campaign. "[ReconShark] is actively delivered to specifically targeted individuals through spear-phishing emails, OneDrive links leading to document downloads, and the execution of malicious macros," SentinelOne researchers Tom Hegel
☐ ☆ ✇ The Hacker News

Lack of Visibility: The Challenge of Protecting Websites from Third-Party Scripts

By: The Hacker News — May 5th 2023 at 10:18
Third-party apps such as Google Analytics, Meta Pixel, HotJar, and JQuery have become critical tools for businesses to optimize their website performance and services for a global audience. However, as their importance has grown, so has the threat of cyber incidents involving unmanaged third-party apps and open-source tools. Online businesses increasingly struggle to maintain complete visibility
☐ ☆ ✇ The Hacker News

Packagist Repository Hacked: Over a Dozen PHP Packages with 500 Million Installs Compromised

By: Ravie Lakshmanan — May 5th 2023 at 09:52
PHP software package repository Packagist revealed that an "attacker" gained access to four inactive accounts on the platform to hijack over a dozen packages with over 500 million installs to date. "The attacker forked each of the packages and replaced the package description in composer.json with their own message but did not otherwise make any malicious changes," Packagist's Nils Adermann said
☐ ☆ ✇ The Hacker News

Fleckpe Android Malware Sneaks onto Google Play Store with Over 620,000 Downloads

By: Ravie Lakshmanan — May 5th 2023 at 07:21
A new Android subscription malware named Fleckpe has been unearthed on the Google Play Store, amassing more than 620,000 downloads in total since 2022. Kaspersky, which identified 11 apps on the official app storefront, said the malware masqueraded as legitimate photo editing apps, camera, and smartphone wallpaper packs. The apps have since been taken down. The operation primarily targets users
☐ ☆ ✇ The Hacker News

Cisco Warns of Vulnerability in Popular Phone Adapter, Urges Migration to Newer Model

By: Ravie Lakshmanan — May 5th 2023 at 05:16
Cisco has warned of a critical security flaw in SPA112 2-Port Phone Adapters that it said could be exploited by a remote attacker to execute arbitrary code on affected devices. The issue, tracked as CVE-2023-20126, is rated 9.8 out of a maximum of 10 on the CVSS scoring system. The company credited Catalpa of DBappSecurity for reporting the shortcoming. The product in question makes it possible
☐ ☆ ✇ The Hacker News

Researchers Discover 3 Vulnerabilities in Microsoft Azure API Management Service

By: Ravie Lakshmanan — May 4th 2023 at 13:19
Three new security flaws have been disclosed in Microsoft Azure API Management service that could be abused by malicious actors to gain access to sensitive information or backend services. This includes two server-side request forgery (SSRF) flaws and one instance of unrestricted file upload functionality in the API Management developer portal, according to Israeli cloud security firm Ermetic. "
☐ ☆ ✇ The Hacker News

Researchers Uncover New Exploit for PaperCut Vulnerability That Can Bypass Detection

By: Ravie Lakshmanan — May 4th 2023 at 13:03
Cybersecurity researchers have found a way to exploit a recently disclosed critical flaw in PaperCut servers in a manner that bypasses all current detections. Tracked as CVE-2023-27350 (CVSS score: 9.8), the issue affects PaperCut MF and NG installations that could be exploited by an unauthenticated attacker to execute arbitrary code with SYSTEM privileges. While the flaw was patched by the
☐ ☆ ✇ The Hacker News

Why the Things You Don't Know about the Dark Web May Be Your Biggest Cybersecurity Threat

By: The Hacker News — May 4th 2023 at 11:15
IT and cybersecurity teams are so inundated with security notifications and alerts within their own systems, it’s difficult to monitor external malicious environments – which only makes them that much more threatening.  In March, a high-profile data breach hit national headlines when personally identifiable information connected to hundreds of lawmakers and staff was leaked on the dark web. The
☐ ☆ ✇ The Hacker News

Meta Uncovers Massive Social Media Cyber Espionage Operations Across South Asia

By: Ravie Lakshmanan — May 4th 2023 at 10:51
Three different threat actors leveraged hundreds of elaborate fictitious personas on Facebook and Instagram to target individuals located in South Asia as part of disparate attacks. "Each of these APTs relied heavily on social engineering to trick people into clicking on malicious links, downloading malware or sharing personal information across the internet," Guy Rosen, chief information
☐ ☆ ✇ The Hacker News

Meta Takes Down Malware Campaign That Used ChatGPT as a Lure to Steal Accounts

By: Ravie Lakshmanan — May 4th 2023 at 08:57
Meta said it took steps to take down more than 1,000 malicious URLs from being shared across its services that were found to leverage OpenAI's ChatGPT as a lure to propagate about 10 malware families since March 2023. The development comes against the backdrop of fake ChatGPT web browser extensions being increasingly used to steal users' Facebook account credentials with an aim to run
☐ ☆ ✇ The Hacker News

Google Introduces Passwordless Secure Sign-In with Passkeys for Google Accounts

By: Ravie Lakshmanan — May 3rd 2023 at 13:45
Almost five months after Google added support for passkeys to its Chrome browser, the tech giant has begun rolling out the passwordless solution across Google Accounts on all platforms. Passkeys, backed by the FIDO Alliance, are a more secure way to sign in to apps and websites without having to use a traditional password. This, in turn, can be achieved by simply unlocking their computer or
☐ ☆ ✇ The Hacker News

Chinese Hacker Group Earth Longzhi Resurfaces with Advanced Malware Tactics

By: Ravie Lakshmanan — May 3rd 2023 at 13:27
A Chinese state-sponsored hacking outfit has resurfaced with a new campaign targeting government, healthcare, technology, and manufacturing entities based in Taiwan, Thailand, the Philippines, and Fiji after more than six months of no activity. Trend Micro attributed the intrusion set to a cyber espionage group it tracks under the name Earth Longzhi, which is a subgroup within APT41 (aka HOODOO
☐ ☆ ✇ The Hacker News

Download the eBook: What Does it Take to be a Full-Fledged Virtual CISO?

By: The Hacker News — May 3rd 2023 at 10:58
Almost half of MSP clients fell victim to a cyberattack within the last 12 months. In the SMB world, the danger is especially acute as only 50% of SMBs have a dedicated internal IT person to take care of cybersecurity. No wonder cybercriminals are targeting SMBs so heavily. No wonder SMBs are increasingly willing to pay a subscription or retainer to gain access to expert C-level cyber-assistance
☐ ☆ ✇ The Hacker News

Operation SpecTor: $53.4 Million Seized, 288 Vendors Arrested in Dark Web Drug Bust

By: Ravie Lakshmanan — May 3rd 2023 at 10:58
An international law enforcement operation has resulted in the arrest of 288 vendors who are believed to be involved in drug trafficking on the dark web, adding to a long list of criminal enterprises that have been shuttered in recent years. The effort, codenamed Operation SpecTor, also saw the authorities confiscating more than $53.4 million in cash and virtual currencies, 850 kg of drugs, and
☐ ☆ ✇ The Hacker News

Apple and Google Join Forces to Stop Unauthorized Location-Tracking Devices

By: Ravie Lakshmanan — May 3rd 2023 at 09:24
Apple and Google have teamed up to work on a draft industry-wide specification that's designed to tackle safety risks and alert users when they are being tracked without their knowledge or permission using devices like AirTags. "The first-of-its-kind specification will allow Bluetooth location-tracking devices to be compatible with unauthorized tracking detection and alerts across Android and
☐ ☆ ✇ The Hacker News

Hackers Exploiting 5-year-old Unpatched Vulnerability in TBK DVR Devices

By: Ravie Lakshmanan — May 3rd 2023 at 07:30
Threat actors are actively exploiting an unpatched five-year-old flaw impacting TBK digital video recording (DVR) devices, according to an advisory issued by Fortinet FortiGuard Labs. The vulnerability in question is CVE-2018-9995 (CVSS score: 9.8), a critical authentication bypass issue that could be exploited by remote actors to gain elevated permissions. "The 5-year-old vulnerability (CVE-
☐ ☆ ✇ The Hacker News

CISA Issues Advisory on Critical RCE Affecting ME RTU Remote Terminal Units

By: Ravie Lakshmanan — May 3rd 2023 at 05:07
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday released an Industrial Control Systems (ICS) advisory about a critical flaw affecting ME RTU remote terminal units. The security vulnerability, tracked as CVE-2023-2131, has received the highest severity rating of 10.0 on the CVSS scoring system for its low attack complexity. "Successful exploitation of this
☐ ☆ ✇ The Hacker News

Researchers Uncover New BGP Flaws in Popular Internet Routing Protocol Software

By: Ravie Lakshmanan — May 2nd 2023 at 14:26
Cybersecurity researchers have uncovered weaknesses in a software implementation of the Border Gateway Protocol (BGP) that could be weaponized to achieve a denial-of-service (DoS) condition on vulnerable BGP peers. The three vulnerabilities reside in version 8.4 of FRRouting, a popular open source internet routing protocol suite for Linux and Unix platforms. It's currently used by several
☐ ☆ ✇ The Hacker News

BouldSpy Android Spyware: Iranian Government's Alleged Tool for Spying on Minority Groups

By: Ravie Lakshmanan — May 2nd 2023 at 11:56
A new Android surveillanceware possibly used by the Iranian government has been used to spy on over 300 individuals belonging to minority groups. The malware, dubbed BouldSpy, has been attributed with moderate confidence to the Law Enforcement Command of the Islamic Republic of Iran (FARAJA). Targeted victims include Iranian Kurds, Baluchis, Azeris, and Armenian Christian groups. "The spyware
☐ ☆ ✇ The Hacker News

Why Telecoms Struggle with SaaS Security

By: The Hacker News — May 2nd 2023 at 11:40
The telecom industry has always been a tantalizing target for cybercriminals. The combination of interconnected networks, customer data, and sensitive information allows cybercriminals to inflict maximum damage through minimal effort. It’s the breaches in telecom companies that tend to have a seismic impact and far-reaching implications — in addition to reputational damage, which can be
☐ ☆ ✇ The Hacker News

LOBSHOT: A Stealthy, Financial Trojan and Info Stealer Delivered through Google Ads

By: Ravie Lakshmanan — May 2nd 2023 at 07:09
In yet another instance of how threat actors are abusing Google Ads to serve malware, a threat actor has been observed leveraging the technique to deliver a new Windows-based financial trojan and information stealer called LOBSHOT. "LOBSHOT continues to collect victims while staying under the radar," Elastic Security Labs researcher Daniel Stepanic said in an analysis published last week. "One
❌