There are new articles available, click to refresh the page.
Today β€” 30 September 2022The Hacker News

WARNING: New Unpatched Microsoft Exchange Zero-Day Under Active Exploitation

30 September 2022 at 04:25
Security researchers are warning of previously undisclosed flaws in fully patched Microsoft Exchange servers being exploited by malicious actors in real-world attacks to achieve remote code execution on affected systems. That's according to Vietnamese cybersecurity company GTSC, which discovered the shortcomings as part of its security monitoring and incident response efforts in August 2022. The
Yesterday β€” 29 September 2022The Hacker News

Brazilian Prilex Hackers Resurfaced With Sophisticated Point-of-Sale Malware

29 September 2022 at 14:15
A Brazilian threat actor known asΒ PrilexΒ has resurfaced after a year-long operational hiatus with an advanced and complex malware to steal money by means of fraudulent transactions. "The Prilex group has shown a high level of knowledge about credit and debit card transactions, and how software used for payment processing works," Kaspersky researchersΒ said. "This enables the attackers to keep

Five Steps to Mitigate the Risk of Credential Exposure

29 September 2022 at 11:45
Every year, billions of credentials appear online, be it on the dark web, clear web, paste sites, or in data dumps shared by cybercriminals. These credentials are often used for account takeover attacks, exposing organizations to breaches, ransomware, and data theft.Β  While CISOs are aware of growing identity threats and have multiple tools in their arsenal to help reduce the potential risk, the

Researchers Uncover Covert Attack Campaign Targeting Military Contractors

29 September 2022 at 12:00
A new covert attack campaign singled out multiple military and weapons contractor companies with spear-phishing emails to trigger a multi-stage infection process designed to deploy an unknown payload on compromised machines. The highly-targeted intrusions, dubbedΒ STEEP#MAVERICKΒ by Securonix, also targeted a strategic supplier to the F-35 Lightning II fighter aircraft. "The attack was carried out

Swachh City Platform Suffers Data Breach Leaking 16 Million User Records

29 September 2022 at 10:12
A threat actor by the name of LeakBase has shared a database containing personal information allegedly affecting 16 million users of Swachh City, an Indian complaint redressal platform. Leaked details include usernames, email addresses, password hashes, mobile numbers, one-time passwords, last logged-in times, and IP addresses, among others, according to a report shared by security firm CloudSEK

Hackers Aid Protests Against Iranian Government with Proxies, Leaks and Hacks

29 September 2022 at 09:56
Several hacktivist groups are using Telegram and other tools to aid anti-government protests in Iran to bypass regime censorship restrictions amidΒ ongoing unrestΒ in the country following the death of Mahsa Amini in custody. "Key activities are data leaking and selling, including officials' phone numbers and emails, and maps of sensitive locations," Israeli cybersecurity firm Check PointΒ saidΒ in
Before yesterdayThe Hacker News

Researchers Warn of New Go-based Malware Targeting Windows and Linux Systems

28 September 2022 at 14:00
A new, multi-functional Go-based malware dubbedΒ ChaosΒ has been rapidly growing in volume in recent months to ensnare a wide range of Windows, Linux, small office/home office (SOHO) routers, and enterprise servers into its botnet. "Chaos functionality includes the ability to enumerate the host environment, run remote shell commands, load additional modules, automatically propagate through

Cyber Criminals Using Quantum Builder Sold on Dark Web to Deliver Agent Tesla Malware

28 September 2022 at 12:36
A recently discovered malware builder called Quantum Builder is being used to deliver the Agent Tesla remote access trojan (RAT). "This campaign features enhancements and a shift toward LNK (Windows shortcut) files when compared to similar attacks in the past," Zscaler ThreatLabz researchers Niraj Shivtarkar and Avinash KumarΒ saidΒ in a Tuesday write-up. <!--adsense--> Sold on the dark web for

Improve your security posture with Wazuh, a free and open source XDR

28 September 2022 at 12:15
Organizations struggle to find ways to keep a good security posture. This is because it is difficult to create secure system policies and find the right tools that help achieve a good posture. In many cases, organizations work with tools that do not integrate with each other and are expensive to purchase and maintain. Security posture management is a term used to describe the process of

Hackers Using PowerPoint Mouseover Trick to Infect System with Malware

28 September 2022 at 10:09
The Russian state-sponsored threat actor known asΒ APT28Β has been found leveraging a new code execution method that makes use of mouse movement in decoy Microsoft PowerPoint documents to deploy malware. The technique "is designed to be triggered when the user starts the presentation mode and moves the mouse," cybersecurity firm Cluster25Β saidΒ in a technical report. "The code execution runs a

Facebook Shuts Down Covert Political 'Influence Operations' from Russia and China

28 September 2022 at 08:45
Meta Platforms on Tuesday disclosed it took steps to dismantle two covert influence operations originating from China and Russia for engaging in coordinated inauthentic behavior (CIB) so as to manipulate public debate. While the Chinese operation sets its sights on the U.S. and the Czech Republic, the Russian network primarily targeted Germany, France, Italy, Ukraine and the U.K. with themes

Critical WhatsApp Bugs Could Have Let Attackers Hack Devices Remotely

28 September 2022 at 05:03
WhatsApp has releasedΒ security updatesΒ to address two flaws in its messaging app for Android and iOS that could lead to remote code execution on vulnerable devices. One of them concernsΒ CVE-2022-36934Β (CVSS score: 9.8), a critical integer overflow vulnerability in WhatsApp that results in the execution of arbitrary code simply by establishing a video call. The issue impacts the WhatsApp and

Ukraine Says Russia Planning Massive Cyberattacks on its Critical Infrastructures

27 September 2022 at 13:54
The Ukrainian government on Monday warned of "massive cyberattacks" by Russia targeting critical infrastructure facilities located in the country and that of its allies. The attacks are said to be targeting the energy sector, the Main Directorate of Intelligence of the Ministry of Defense of Ukraine (GUR) said. "By the cyberattacks, the enemy will try to increase the effect of missile strikes on

New NullMixer Malware Campaign Stealing Users' Payment Data and Credentials

27 September 2022 at 13:19
Cybercriminals are continuing to prey on users searching for cracked software by directing them to fraudulent websites hosting weaponized installers that deploy malware calledΒ NullMixerΒ on compromised systems. "When a user extracts and executes NullMixer, it drops a number of malware files to the compromised machine," cybersecurity firm Kaspersky said in a Monday report. "It drops a wide variety

Experts Uncover 85 Apps with 13 Million Downloads Involved in Ad Fraud Scheme

27 September 2022 at 12:04
As many as 75 apps on Google Play and 10 on Apple App Store have been discovered engaging in ad fraud as part of an ongoing campaign that commenced in 2019. The latest iteration, dubbedΒ ScyllaΒ by Online fraud-prevention firm HUMAN Security, follows similar attack waves in August 2019 and late 2020 that go by the codename Poseidon and Charybdis, respectively. Prior to their removal from the app

Why Continuous Security Testing is a Must for Organizations Today

27 September 2022 at 11:39
The global cybersecurity market is flourishing. Experts at Gartner predict that the end-user spending for the information security and risk management market will grow from $172.5 billion in 2022 to $267.3 billion in 2026.Β  One big area of spending includes the art of putting cybersecurity defenses under pressure, commonly known as security testing. MarketsandMarkets forecasts the global

North Korea's Lazarus Hackers Targeting macOS Users Interested in Crypto Jobs

27 September 2022 at 09:46
The infamous Lazarus Group has continued its pattern of leveraging unsolicited job opportunities to deploy malware targeting Apple's macOS operating system. In the latest variant of the campaign observed by cybersecurity company SentinelOne last week, decoy documents advertising positions for the Singapore-based cryptocurrency exchange firm Crypto[.]com have been used to mount the attacks. The

Hacker Behind Optus Breach Releases 10,200 Customer Records in Extortion Scheme

27 September 2022 at 06:14
The Australian Federal Police (AFP) on Monday disclosed it's working to gather "crucial evidence" and that it's collaborating with overseas law enforcement authorities following the hack of telecom provider Optus. "Operation Hurricane has been launched to identify the criminals behind the alleged breach and to help shield Australians from identity fraud," the AFPΒ saidΒ in a statement. The
  • There are no more articles