❌

Normal view

There are new articles available, click to refresh the page.
Before yesterdayThe Hacker News

U.S. Sanctions 6 Iranian Officials for Critical Infrastructure Cyber Attacks

By: Newsroom
3 February 2024 at 07:33
The U.S. Treasury Department's Office of Foreign Assets Control (OFAC) announced sanctions against six officials associated with the Iranian intelligence agency for attacking critical infrastructure entities in the U.S. and other countries. TheΒ officialsΒ include Hamid Reza Lashgarian, Mahdi Lashgarian, Hamid Homayunfal, Milad Mansuri, Mohammad Bagher Shirinkar, and Reza Mohammad Amin

New Mispadu Banking Trojan Exploiting Windows SmartScreen Flaw

By: Newsroom
5 February 2024 at 03:45
The threat actors behind the Mispadu banking Trojan have become the latest to exploit a now-patched Windows SmartScreen security bypass flaw to compromise users in Mexico. The attacks entail a new variant of the malware that was first observed in 2019, Palo Alto Networks Unit 42 said in a report published last week. Propagated via phishing mails, Mispadu is a Delphi-based information stealer

Pegasus Spyware Targeted iPhones of Journalists and Activists in Jordan

By: Newsroom
5 February 2024 at 07:37
The iPhones belonging to nearly three dozen journalists, activists, human rights lawyers, and civil society members in Jordan have been targeted with NSO Group's Pegasus spyware, according to joint findings from Access Now and the Citizen Lab. Nine of the 35 individuals have beenΒ publicly confirmedΒ asΒ targeted, out of whom six had their devices compromised with the mercenary

Combined Security Practices Changing the Game for Risk Management

5 February 2024 at 11:12
A significant challenge within cyber security at present is that there are a lot of risk management platforms available in the market, but only some deal with cyber risks in a very good way. The majority will shout alerts at the customer as and when they become apparent and cause great stress in the process. The issue being that by using a reactive, rather than proactive approach, many risks

Hands-On Review: SASE-based XDR from Cato Networks

5 February 2024 at 11:12
Companies are engaged in a seemingly endless cat-and-mouse game when it comes to cybersecurity and cyber threats. As organizations put up one defensive block after another, malicious actors kick their game up a notch to get around those blocks. Part of the challenge is to coordinate the defensive abilities of disparate security tools, even as organizations have limited resources and a dearth of

Patchwork Using Romance Scam Lures to Infect Android Devices with VajraSpy Malware

By: Newsroom
5 February 2024 at 13:18
The threat actor known as Patchwork likely used romance scam lures to trap victims in Pakistan and India, and infect their Android devices with a remote access trojan calledΒ VajraSpy. Slovak cybersecurity firm ESET said it uncovered 12 espionage apps, six of which were available for download from the official Google Play Store and were collectively downloaded more than 1,400 times between

Belarusian National Linked to BTC-e Faces 25 Years for $4 Billion Crypto Money Laundering

By: Newsroom
5 February 2024 at 16:36
A 42-year-old Belarusian and Cypriot national with alleged connections to the now-defunct cryptocurrency exchange BTC-e is facing charges related to money laundering and operating an unlicensed money services business. Aliaksandr Klimenka, who was arrested in Latvia on December 21, 2023, was extradited to the U.S. and is currently being held in custody. If convicted, he faces a maximum penalty

U.S. Imposes Visa Restrictions on those Involved in Illegal Spyware Surveillance

By: Newsroom
6 February 2024 at 05:00
The U.S. State Department said it's implementing a new policy that imposes visa restrictions on individuals who are linked to the illegal use of commercial spyware to surveil civil society members. "TheΒ misuse of commercial spywareΒ threatens privacy and freedoms of expression, peaceful assembly, and association," Secretary of State Antony BlinkenΒ said. "Such targeting has been

Recent SSRF Flaw in Ivanti VPN Products Undergoes Mass Exploitation

By: Newsroom
6 February 2024 at 06:58
A recently disclosed server-side request forgery (SSRF) vulnerability impacting Ivanti Connect Secure and Policy Secure products has come under mass exploitation. The Shadowserver FoundationΒ saidΒ it observed exploitation attempts originating from more than 170 unique IP addresses that aim to establish a reverse shell, among others. The attacks exploitΒ CVE-2024-21893Β (CVSS

Hackers Exploit Job Boards, Stealing Millions of Resumes and Personal Data

By: Newsroom
6 February 2024 at 10:14
Employment agencies and retail companies chiefly located in the Asia-Pacific (APAC) region have been targeted by a previously undocumented threat actor known asΒ ResumeLootersΒ since early 2023 with the goal of stealing sensitive data. Singapore-headquartered Group-IB said the hacking crew's activities are geared towards job search platforms and the theft of resumes, with as many as 65

How a $10B Enterprise Customer Drastically Increased their SaaS Security Posture with 201% ROI by Using SSPM

6 February 2024 at 10:53
SaaS applications are the darlings of the software world. They enable work from anywhere, facilitate collaboration, and offer a cost-effective alternative to owning the software outright. At the same time, the very features that make SaaS apps so embraced – access from anywhere and collaboration – can also be exploited by threat actors. Recently, Adaptive Shield commissioned a Total Economic

Experts Detail New Flaws in Azure HDInsight Spark, Kafka, and Hadoop Services

By: Newsroom
6 February 2024 at 14:02
Three new security vulnerabilities have been discovered in Azure HDInsight's ApacheΒ Hadoop,Β Kafka, andΒ SparkΒ services that could be exploited to achieve privilege escalation and a regular expression denial-of-service (ReDoS) condition. "The new vulnerabilities affect any authenticated user of Azure HDInsight services such as Apache Ambari and Apache Oozie," Orca security

Beware: Fake Facebook Job Ads Spreading 'Ov3r_Stealer' to Steal Crypto and Credentials

By: Newsroom
6 February 2024 at 14:09
Threat actors are leveraging bogus Facebook job advertisements as a lure to trick prospective targets into installing a new Windows-based stealer malware codenamedΒ Ov3r_Stealer. "This malware is designed to steal credentials and crypto wallets and send those to a Telegram channel that the threat actor monitors," Trustwave SpiderLabs said in a report shared with The Hacker News. Ov3r_Stealer

Critical JetBrains TeamCity On-Premises Flaw Exposes Servers to Takeover - Patch Now

By: Newsroom
7 February 2024 at 05:05
JetBrains is alerting customers of a critical security flaw in its TeamCity On-Premises continuous integration and continuous deployment (CI/CD) software that could be exploited by threat actors to take over susceptible instances. The vulnerability, tracked asΒ CVE-2024-23917, carries a CVSS rating of 9.8 out of 10, indicative of its severity. "The vulnerability may enable an unauthenticated

Chinese Hackers Exploited FortiGate Flaw to Breach Dutch Military Network

By: Newsroom
7 February 2024 at 06:29
Chinese state-backed hackers broke into a computer network that's used by the Dutch armed forces by targeting Fortinet FortiGate devices. "This [computer network] was used for unclassified research and development (R&D)," the Dutch Military Intelligence and Security Service (MIVD)Β saidΒ in a statement. "Because this system was self-contained, it did not lead to any damage to the

Global Coalition and Tech Giants Unite Against Commercial Spyware Abuse

By: Newsroom
7 February 2024 at 09:45
A coalition of dozens of countries, including France, the U.K., and the U.S., along with tech companies such as Google, MDSec, Meta, and Microsoft, have signed a joint agreement to curb the abuse of commercial spyware to commit human rights abuses. The initiative, dubbed theΒ Pall Mall Process, aims to tackle the proliferation and irresponsible use of commercial cyber intrusion tools by

New Webinar: 5 Steps to vCISO Success for MSPs and MSSPs

7 February 2024 at 10:38
2024 will be the year of the vCISO. An incredible 45% of MSPs and MSSPs areΒ planning to start offeringΒ vCISO services in 2024. As an MSP/MSSP providing vCISO services, you own the organization’s cybersecurity infrastructure and strategy. But you also need to position yourself as a reliable decision-maker, navigating professional responsibilities, business needs and leadership

Critical Boot Loader Vulnerability in Shim Impacts Nearly All Linux Distros

By: Newsroom
7 February 2024 at 13:33
The maintainers of shim have releasedΒ version 15.8Β to address six security flaws, including a critical bug that could pave the way for remote code execution under specific circumstances. Tracked asΒ CVE-2023-40547Β (CVSS score: 9.8), the vulnerability could be exploited to achieve a Secure Boot bypass. Bill Demirkapi of the Microsoft Security Response Center (MSRC) has been&

After FBI Takedown, KV-Botnet Operators Shift Tactics in Attempt to Bounce Back

By: Newsroom
7 February 2024 at 15:11
The threat actors behind theΒ KV-botnetΒ made "behavioral changes" to the malicious network as U.S. law enforcement began issuing commands to neutralize the activity. KV-botnet is the name given to a network of compromised small office and home office (SOHO) routers and firewall devices across the world, with one specific cluster acting as a covert data transfer system for other Chinese

Critical Patches Released for New Flaws in Cisco, Fortinet, VMware Products

By: Newsroom
8 February 2024 at 05:10
Cisco, Fortinet, and VMware have released security fixes for multiple security vulnerabilities, including critical weaknesses that could be exploited to perform arbitrary actions on affected devices. The first set from Cisco consists of three flaws – CVE-2024-20252 and CVE-2024-20254 (CVSS score: 9.6) and CVE-2024-20255 (CVSS score: 8.2) – impacting Cisco Expressway Series that could allow an

Kimsuky's New Golang Stealer 'Troll' and 'GoBear' Backdoor Target South Korea

By: Newsroom
8 February 2024 at 06:53
The North Korea-linked nation-state actor known as Kimsuky is suspected of using a previously undocumented Golang-based information stealer calledΒ Troll Stealer. The malware steals "SSH, FileZilla, C drive files/directories, browsers, system information, [and] screen captures" from infected systems, South Korean cybersecurity company S2WΒ saidΒ in a new technical report. Troll

Google Starts Blocking Sideloading of Potentially Dangerous Android Apps in Singapore

By: Newsroom
8 February 2024 at 10:17
Google has unveiled a new pilot program in Singapore that aims to prevent users from sideloading certain apps that abuse Android app permissions to read one-time passwords and gather sensitive data. "This enhanced fraud protection will analyze and automatically block the installation of apps that may use sensitive runtime permissions frequently abused for financial fraud when the user attempts

HijackLoader Evolves: Researchers Decode the Latest Evasion Methods

By: Newsroom
8 February 2024 at 10:28
The threat actors behind a loader malware calledΒ HijackLoaderΒ have added new techniques for defense evasion, as the malware continues to be increasingly used by other threat actors to deliver additional payloads and tooling. "The malware developer used a standard process hollowing technique coupled with an additional trigger that was activated by the parent process writing to a pipe,"

Unified Identity – look for the meaning behind the hype!

8 February 2024 at 10:39
If you've listened to software vendors in the identity space lately, you will have noticed that β€œunified” has quickly become the buzzword that everyone is adopting to describe their portfolio. And this is great! Unified identity has some amazing benefits!Β  However (there is always a however, right?) not every β€œunified” β€œidentity” β€œsecurity” β€œplatform” is made equal. Some vendors call the

Chinese Hackers Operate Undetected in U.S. Critical Infrastructure for Half a Decade

By: Newsroom
8 February 2024 at 13:05
The U.S. government on Wednesday said the Chinese state-sponsored hacking group known asΒ Volt TyphoonΒ had been embedded into some critical infrastructure networks in the country for at least five years. Targets of the threat actor include communications, energy, transportation, and water and wastewater systems sectors in the U.S. and Guam. "Volt Typhoon's choice of targets and pattern

Warning: New Ivanti Auth Bypass Flaw Affects Connect Secure and ZTA Gateways

By: Newsroom
9 February 2024 at 03:35
Ivanti has alerted customers of yet another high-severity security flaw in its Connect Secure, Policy Secure, and ZTA gateway devices that could allow attackers to bypass authentication. The issue, tracked asΒ CVE-2024-22024, is rated 8.3 out of 10 on the CVSS scoring system. "An XML external entity or XXE vulnerability in the SAML component of Ivanti Connect Secure (9.x, 22.x), Ivanti

Fortinet Warns of Critical FortiOS SSL VPN Flaw Likely Under Active Exploitation

By: Newsroom
9 February 2024 at 07:45
Fortinet has disclosed a new critical security flaw in FortiOS SSL VPN that it said is likely being exploited in the wild. The vulnerability,Β CVE-2024-21762Β (CVSS score: 9.6), allows for the execution of arbitrary code and commands. "An out-of-bounds write vulnerability [CWE-787] in FortiOS may allow a remote unauthenticated attacker to execute arbitrary code or command via specially

Stealthy Zardoor Backdoor Targets Saudi Islamic Charity Organization

By: Newsroom
9 February 2024 at 06:31
An unnamed Islamic non-profit organization in Saudi Arabia has been targeted as part of a stealthy cyber espionage campaign designed to drop a previously undocumented backdoor calledΒ Zardoor. Cisco Talos, which discovered the activity in May 2023, said the campaign has likely persisted since at least March 2021, adding it has identified only one compromised target to date, although it's

Wazuh in the Cloud Era: Navigating the Challenges of Cybersecurity

9 February 2024 at 07:40
Cloud computing has innovated how organizations operate and manage IT operations, such as data storage, application deployment, networking, and overall resource management. The cloud offers scalability, adaptability, and accessibility, enabling businesses to achieve sustainable growth. However, adopting cloud technologies into your infrastructure presents various cybersecurity risks and

❌
❌