❌

Normal view

There are new articles available, click to refresh the page.
Yesterday β€” 15 April 2024The Hacker News

Intel and Lenovo BMCs Contain Unpatched Lighttpd Server Flaw

By: Newsroom
15 April 2024 at 16:51
A security flaw impacting the Lighttpd web server used in baseboard management controllers (BMCs) has remained unpatched by device vendors like Intel and Lenovo, new findings from Binarly reveal. While the original shortcoming wasΒ discovered and patchedΒ by the Lighttpd maintainers way back in August 2018 withΒ version 1.4.51, the lack of a CVE identifier or an advisory meant that

AI Copilot: Launching Innovation Rockets, But Beware of the Darkness Ahead

15 April 2024 at 13:30
Imagine a world where the software that powers your favorite apps, secures your online transactions, and keeps your digital life could be outsmarted and taken over by a cleverly disguised piece of code. This isn't a plot from the latest cyber-thriller; it's actually been a reality for years now. How this will change – in a positive or negative direction – as artificial intelligence (AI) takes on

Muddled Libra Shifts Focus to SaaS and Cloud for Extortion and Data Theft Attacks

By: Newsroom
15 April 2024 at 13:29
The threat actor known asΒ Muddled LibraΒ has been observed actively targeting software-as-a-service (SaaS) applications and cloud service provider (CSP) environments in a bid to exfiltrate sensitive data. "Organizations often store a variety of data in SaaS applications and use services from CSPs," Palo Alto Networks Unit 42Β saidΒ in a report published last week. "The threat

Timing is Everything: The Role of Just-in-Time Privileged Access in Security Evolution

15 April 2024 at 10:21
To minimize the risk of privilege misuse, a trend in the privileged access management (PAM) solution market involves implementing just-in-time (JIT) privileged access. This approach toΒ privileged identity managementΒ aims to mitigate the risks associated with prolonged high-level access by granting privileges temporarily and only when necessary, rather than providing users with

Chinese-Linked LightSpy iOS Spyware Targets South Asian iPhone Users

By: Newsroom
15 April 2024 at 09:04
Cybersecurity researchers have discovered a "renewed" cyber espionage campaign targeting users in South Asia with the aim of delivering an Apple iOS spyware implant calledΒ LightSpy. "The latest iteration of LightSpy, dubbed 'F_Warehouse,' boasts a modular framework with extensive spying features," the BlackBerry Threat Research and Intelligence TeamΒ saidΒ in a report published last

Palo Alto Networks Releases Urgent Fixes for Exploited PAN-OS Vulnerability

By: Newsroom
15 April 2024 at 08:17
Palo Alto Networks has released hotfixes to address a maximum-severity security flaw impacting PAN-OS software that has come under active exploitation in the wild. Tracked asΒ CVE-2024-3400Β (CVSS score: 10.0), the critical vulnerability is a case of command injection in the GlobalProtect feature that an unauthenticated attacker could weaponize to execute arbitrary code with root

Before yesterdayThe Hacker News

Ex-Security Engineer Jailed 3 Years for $12.3 Million Crypto Exchange Thefts

By: Newsroom
13 April 2024 at 14:25
A former security engineer has beenΒ sentencedΒ to three years in prison in the U.S. for charges relating to hacking two decentralized cryptocurrency exchanges in July 2022 and stealing over $12.3 million. Shakeeb Ahmed, the defendant in question,Β pled guiltyΒ to one count of computer fraud in December 2023Β following his arrestΒ in July. "At the time of both attacks,

U.S. Treasury Hamas Spokesperson for Cyber Influence Operations

By: Newsroom
13 April 2024 at 13:58
The U.S. Treasury Department's Office of Foreign Assets Control (OFAC) on Friday announced sanctions against an official associated with Hamas for his involvement in cyber influence operations. Hudhayfa Samir β€˜Abdallah al-Kahlut, 39, also known as Abu Ubaida, has served as the public spokesperson of Izz al-Din al-Qassam Brigades, the military wing of Hamas, since at least 2007. "He publicly

Hackers Deploy Python Backdoor in Palo Alto Zero-Day Attack

By: Newsroom
13 April 2024 at 08:25
Threat actors have been exploiting the newly disclosed zero-day flaw in Palo Alto Networks PAN-OS software dating back to March 26, 2024, nearly three weeks before it came to light yesterday. The network security company's Unit 42 division isΒ trackingΒ the activity under the nameΒ Operation MidnightEclipse, attributing it as the work of a single threat actor of

Popular Rust Crate liblzma-sys Compromised with XZ Utils Backdoor Files

By: Newsroom
12 April 2024 at 14:55
"Test files" associated with theΒ XZ Utils backdoorΒ have made their way to a Rust crate known asΒ liblzma-sys, newΒ findingsΒ from Phylum reveal. liblzma-sys, which has been downloaded over 21,000 times to date, provides Rust developers with bindings to the liblzma implementation, an underlying library that is part of theΒ XZ UtilsΒ data compression software. The

Code Keepers: Mastering Non-Human Identity Management

12 April 2024 at 11:13
Identities now transcend human boundaries. Within each line of code and every API call lies a non-human identity. These entities act as programmatic access keys, enabling authentication and facilitating interactions among systems and services, which are essential for every API call, database query, or storage account access. As we depend on multi-factor authentication and passwords to safeguard

Iranian MuddyWater Hackers Adopt New C2 Tool 'DarkBeatC2' in Latest Campaign

By: Newsroom
12 April 2024 at 09:49
The Iranian threat actor known as MuddyWater has been attributed to a new command-and-control (C2) infrastructure calledΒ DarkBeatC2, becoming the latest such tool in its arsenal afterΒ SimpleHarm,Β MuddyC3, PhonyC2, andΒ MuddyC2Go. "While occasionally switching to a new remote administration tool or changing their C2 framework, MuddyWater’s methods remain constant," Deep

Zero-Day Alert: Critical Palo Alto Networks PAN-OS Flaw Under Active Attack

By: Newsroom
12 April 2024 at 08:56
Palo Alto Networks is warning that a critical flaw impacting PAN-OS software used in its GlobalProtect gateways is being actively exploited in the wild. Tracked asΒ CVE-2024-3400, the issue has a CVSS score of 10.0, indicating maximum severity. "A command injection vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct

Sneaky Credit Card Skimmer Disguised as Harmless Facebook Tracker

By: Newsroom
12 April 2024 at 05:09
Cybersecurity researchers have discovered a credit card skimmer that's concealed within a fakeΒ Meta Pixel tracker scriptΒ in an attempt to evade detection. Sucuri said that the malware is injected into websites through tools that allow for custom code, such as WordPress plugins likeΒ Simple Custom CSS and JSΒ or the "Miscellaneous Scripts" section of the Magento admin panel. "

U.S. Federal Agencies Ordered to Hunt for Signs of Microsoft Breach and Mitigate Risks

By: Newsroom
12 April 2024 at 04:32
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday issued an emergency directive (ED 24-02) urging federal agencies to hunt for signs of compromise and enact preventive measures following the recent compromise of Microsoft's systems that led to the theft of email correspondence with the company. The attack, whichΒ came to lightΒ earlier this year, has been

Python's PyPI Reveals Its Secrets

11 April 2024 at 11:32
GitGuardian is famous for its annualΒ State of Secrets SprawlΒ report. In their 2023 report, they found over 10 million exposed passwords, API keys, and other credentials exposed in public GitHub commits. The takeaways in their 2024 report did not just highlight 12.8 millionΒ newΒ exposed secrets in GitHub, but a number in the popular Python package repositoryΒ PyPI. PyPI,

TA547 Phishing Attack Hits German Firms with Rhadamanthys Stealer

By: Newsroom
11 April 2024 at 11:32
A threat actor tracked asΒ TA547Β has targeted dozens of German organizations with an information stealer calledΒ RhadamanthysΒ as part of an invoice-themed phishing campaign. "This is the first time researchers observed TA547 use Rhadamanthys, an information stealer that is used by multiple cybercriminal threat actors," ProofpointΒ said. "Additionally, the actor appeared to

Apple Updates Spyware Alert System to Warn Victims of Mercenary Attacks

By: Newsroom
11 April 2024 at 06:44
Apple on WednesdayΒ revisedΒ its documentation pertaining to its mercenary spyware threat notification system to mention that it alerts users when they may have been individually targeted by such attacks. It also specifically called out companies like NSO Group for developing commercial surveillance tools such as Pegasus that are used by state actors to pull off "individually targeted

Fortinet Rolls Out Critical Security Patches for FortiClientLinux Vulnerability

By: Newsroom
11 April 2024 at 05:23
Fortinet has released patches to address a critical security flaw impacting FortiClientLinux that could be exploited to achieve arbitrary code execution. Tracked as CVE-2023-45590, the vulnerability carries a CVSS score of 9.4 out of a maximum of 10. "An Improper Control of Generation of Code ('Code Injection') vulnerability [CWE-94] in FortiClientLinux may allow an unauthenticated attacker to

'eXotic Visit' Spyware Campaign Targets Android Users in India and Pakistan

By: Newsroom
10 April 2024 at 14:24
An active Android malware campaign dubbed eXotic Visit has been primarily targeting users in South Asia, particularly those in India and Pakistan, with malware distributed via dedicated websites and Google Play Store. Slovak cybersecurity firm said the activity, ongoing since November 2021, is not linked to any known threat actor or group. It's tracking the group behind the operation under the

Raspberry Robin Returns: New Malware Campaign Spreading Through WSF Files

By: Newsroom
10 April 2024 at 13:10
Cybersecurity researchers have discovered a new Raspberry Robin campaign wave that has been propagating the malware through malicious Windows Script Files (WSFs) since March 2024. "Historically, Raspberry Robin was known to spread through removable media like USB drives, but over time its distributors have experimented with other initial infection vectors," HP Wolf Security researcher Patrick

Beware: GitHub's Fake Popularity Scam Tricking Developers into Downloading Malware

By: Newsroom
10 April 2024 at 12:38
Threat actors are now taking advantage of GitHub's search functionality to trick unsuspecting users looking for popular repositories into downloading spurious counterparts that serve malware. The latest assault on the open-source software supply chain involves concealing malicious code within Microsoft Visual Code project files that's designed to download next-stage payloads from a remote URL,

Hands-on Review: Cynomi AI-powered vCISO Platform

10 April 2024 at 11:00
The need for vCISO services is growing. SMBs and SMEs are dealing with more third-party risks, tightening regulatory demands and stringent cyber insurance requirements than ever before. However, they often lack the resources and expertise to hire an in-house security executive team. By outsourcing security and compliance leadership to a vCISO, these organizations can more easily obtain

Researchers Uncover First Native Spectre v2 Exploit Against Linux Kernel

By: Newsroom
10 April 2024 at 09:26
Cybersecurity researchers have disclosed what they say is the "first native Spectre v2 exploit" against the Linux kernel on Intel systems that could be exploited to read sensitive data from the memory. The exploit, called Native Branch History Injection (BHI), can be used to leak arbitrary kernel memory at 3.5 kB/sec by bypassing existing Spectre v2/BHI mitigations, researchers from Systems and

Webinar: Learn How to Stop Hackers from Exploiting Hidden Identity Weaknesses

10 April 2024 at 09:02
We all know passwords and firewalls are important, but what about the invisible threats lurking beneath the surface of your systems? Identity Threat Exposures (ITEs) are like secret tunnels for hackers – they make your security way more vulnerable than you think. Think of it like this: misconfigurations, forgotten accounts, and old settings are like cracks in your digital fortress walls. Hackers

Microsoft Fixes 149 Flaws in Huge April Patch Release, Zero-Days Included

By: Newsroom
10 April 2024 at 04:57
Microsoft has released security updates for the month of April 2024 to remediate a recordΒ 149 flaws, two of which have come under active exploitation in the wild. Of the 149 flaws, three are rated Critical, 142 are rated Important, three are rated Moderate, and one is rated Low in severity. The update is aside fromΒ 21 vulnerabilitiesΒ that the company addressed in its

Critical 'BatBadBut' Rust Vulnerability Exposes Windows Systems to Attacks

By: Newsroom
10 April 2024 at 03:05
A critical security flaw in the Rust standard library could be exploited to target Windows users and stage command injection attacks. The vulnerability, tracked asΒ CVE-2024-24576, has a CVSS score of 10.0, indicating maximum severity. That said, it only impacts scenarios where batch files are invoked on Windows with untrusted arguments. "The Rust standard library did not properly escape

10-Year-Old 'RUBYCARP' Romanian Hacker Group Surfaces with Botnet

By: Newsroom
9 April 2024 at 14:01
A threat group of suspected Romanian origin calledΒ RUBYCARPΒ has been observed maintaining a long-running botnet for carrying out crypto mining, distributed denial-of-service (DDoS), and phishing attacks. The group, believed to be active for at least 10 years, employs the botnet for financial gain, Sysdig said in a report shared with The Hacker News. "Its primary method of operation

Hackers Targeting Human Rights Activists in Morocco and Western Sahara

By: Newsroom
9 April 2024 at 13:45
Human rights activists in Morocco and the Western Sahara region are the targets of a new threat actor that leverages phishing attacks to trick victims into installing bogus Android apps and serve credential harvesting pages for Windows users. Cisco Talos isΒ trackingΒ the activity cluster under the nameΒ Starry Addax, describing it as primarily singling out activists associated with

❌
❌