The Hacker News

Syndikovat obsah
The Hacker News has been internationally recognized as a leading news source dedicated to promoting awareness for security experts and [email protected]
Aktualizace: 17 min 34 sek zpět

New "Goldoon" Botnet Targets D-Link Routers With Decade-Old Flaw

2 Květen, 2024 - 12:10
A never-before-seen botnet called Goldoon has been observed targeting D-Link routers with a nearly decade-old critical security flaw with the goal of using the compromised devices for further attacks. The vulnerability in question is CVE-2015-2051 (CVSS score: 9.8), which affects D-Link DIR-645 routers and allows remote attackers to execute arbitrary
Kategorie: Hacking & Security

New "Goldoon" Botnet Targets D-Link Routers With Decade-Old Flaw

2 Květen, 2024 - 12:10
A never-before-seen botnet called Goldoon has been observed targeting D-Link routers with a nearly decade-old critical security flaw with the goal of using the compromised devices for further attacks. The vulnerability in question is CVE-2015-2051 (CVSS score: 9.8), which affects D-Link DIR-645 routers and allows remote attackers to execute arbitrary Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability

2 Květen, 2024 - 08:15
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical flaw impacting GitLab to its Known Exploited Vulnerabilities (KEV) catalog, owing to active exploitation in the wild. Tracked as CVE-2023-7028 (CVSS score: 10.0), the maximum severity vulnerability could facilitate account takeover by sending password reset emails to an unverified email
Kategorie: Hacking & Security

CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability

2 Květen, 2024 - 08:15
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical flaw impacting GitLab to its Known Exploited Vulnerabilities (KEV) catalog, owing to active exploitation in the wild. Tracked as CVE-2023-7028 (CVSS score: 10.0), the maximum severity vulnerability could facilitate account takeover by sending password reset emails to an unverified email Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

New Cuttlefish Malware Hijacks Router Connections, Sniffs for Cloud Credentials

2 Květen, 2024 - 07:04
A new malware called Cuttlefish is targeting small office and home office (SOHO) routers with the goal of stealthily monitoring all traffic through the devices and gather authentication data from HTTP GET and POST requests. "This malware is modular, designed primarily to steal authentication material found in web requests that transit the router from the adjacent
Kategorie: Hacking & Security

New Cuttlefish Malware Hijacks Router Connections, Sniffs for Cloud Credentials

2 Květen, 2024 - 07:04
A new malware called Cuttlefish is targeting small office and home office (SOHO) routers with the goal of stealthily monitoring all traffic through the devices and gather authentication data from HTTP GET and POST requests. "This malware is modular, designed primarily to steal authentication material found in web requests that transit the router from the adjacent Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Bitcoin Forensic Analysis Uncovers Money Laundering Clusters and Criminal Proceeds

1 Květen, 2024 - 16:25
A forensic analysis of a graph dataset containing transactions on the Bitcoin blockchain has revealed clusters associated with illicit activity and money laundering, including detecting criminal proceeds sent to a crypto exchange and previously unknown wallets belonging to a Russian darknet market. The findings come from Elliptic in collaboration with researchers from the&
Kategorie: Hacking & Security

Bitcoin Forensic Analysis Uncovers Money Laundering Clusters and Criminal Proceeds

1 Květen, 2024 - 16:25
A forensic analysis of a graph dataset containing transactions on the Bitcoin blockchain has revealed clusters associated with illicit activity and money laundering, including detecting criminal proceeds sent to a crypto exchange and previously unknown wallets belonging to a Russian darknet market. The findings come from Elliptic in collaboration with researchers from the&Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Android Malware Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers

1 Květen, 2024 - 15:41
Cybersecurity researchers have discovered a previously undocumented malware targeting Android devices that uses compromised WordPress sites as relays for its actual command-and-control (C2) servers for detection evasion. The malware, codenamed Wpeeper, is an ELF binary that leverages the HTTPS protocol to secure its C2 communications. "Wpeeper is a typical backdoor Trojan for Android
Kategorie: Hacking & Security

Android Malware Wpeeper Uses Compromised WordPress Sites to Hide C2 Servers

1 Květen, 2024 - 15:41
Cybersecurity researchers have discovered a previously undocumented malware targeting Android devices that uses compromised WordPress sites as relays for its actual command-and-control (C2) servers for detection evasion. The malware, codenamed Wpeeper, is an ELF binary that leverages the HTTPS protocol to secure its C2 communications. "Wpeeper is a typical backdoor Trojan for Android Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

How to Make Your Employees Your First Line of Cyber Defense

1 Květen, 2024 - 13:03
There’s a natural human desire to avoid threatening scenarios. The irony, of course, is if you hope to attain any semblance of security, you’ve got to remain prepared to confront those very same threats. As a decision-maker for your organization, you know this well. But no matter how many experts or trusted cybersecurity tools your organization has a standing guard,
Kategorie: Hacking & Security

How to Make Your Employees Your First Line of Cyber Defense

1 Květen, 2024 - 13:03
There’s a natural human desire to avoid threatening scenarios. The irony, of course, is if you hope to attain any semblance of security, you’ve got to remain prepared to confront those very same threats. As a decision-maker for your organization, you know this well. But no matter how many experts or trusted cybersecurity tools your organization has a standing guard, The Hacker Newshttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

ZLoader Malware Evolves with Anti-Analysis Trick from Zeus Banking Trojan

1 Květen, 2024 - 12:27
The authors behind the resurfaced ZLoader malware have added a feature that was originally present in the Zeus banking trojan that it's based on, indicating that it's being actively developed. "The latest version, 2.4.1.0, introduces a feature to prevent execution on machines that differ from the original infection," Zscaler ThreatLabz researcher Santiago
Kategorie: Hacking & Security

ZLoader Malware Evolves with Anti-Analysis Trick from Zeus Banking Trojan

1 Květen, 2024 - 12:27
The authors behind the resurfaced ZLoader malware have added a feature that was originally present in the Zeus banking trojan that it's based on, indicating that it's being actively developed. "The latest version, 2.4.1.0, introduces a feature to prevent execution on machines that differ from the original infection," Zscaler ThreatLabz researcher Santiago Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Ex-NSA Employee Sentenced to 22 Years for Trying to Sell U.S. Secrets to Russia

1 Květen, 2024 - 08:32
A former employee of the U.S. National Security Agency (NSA) has been sentenced to nearly 22 years (262 months) in prison for attempting to transfer classified documents to Russia. "This sentence should serve as a stark warning to all those entrusted with protecting national defense information that there are consequences to betraying that trust," said FBI Director Christopher Wray.
Kategorie: Hacking & Security

Ex-NSA Employee Sentenced to 22 Years for Trying to Sell U.S. Secrets to Russia

1 Květen, 2024 - 08:32
A former employee of the U.S. National Security Agency (NSA) has been sentenced to nearly 22 years (262 months) in prison for attempting to transfer classified documents to Russia. "This sentence should serve as a stark warning to all those entrusted with protecting national defense information that there are consequences to betraying that trust," said FBI Director Christopher Wray. Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Millions of Malicious 'Imageless' Containers Planted on Docker Hub Over 5 Years

30 Duben, 2024 - 15:36
Cybersecurity researchers have discovered multiple campaigns targeting Docker Hub by planting millions of malicious "imageless" containers over the past five years, once again underscoring how open-source registries could pave the way for supply chain attacks. "Over four million of the repositories in Docker Hub are imageless and have no content except for the repository
Kategorie: Hacking & Security

Millions of Malicious 'Imageless' Containers Planted on Docker Hub Over 5 Years

30 Duben, 2024 - 15:36
Cybersecurity researchers have discovered multiple campaigns targeting Docker Hub by planting millions of malicious "imageless" containers over the past five years, once again underscoring how open-source registries could pave the way for supply chain attacks. "Over four million of the repositories in Docker Hub are imageless and have no content except for the repository Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

U.S. Government Releases New AI Security Guidelines for Critical Infrastructure

30 Duben, 2024 - 12:36
The U.S. government has unveiled new security guidelines aimed at bolstering critical infrastructure against artificial intelligence (AI)-related threats. "These guidelines are informed by the whole-of-government effort to assess AI risks across all sixteen critical infrastructure sectors, and address threats both to and from, and involving AI systems," the Department of Homeland Security (DHS)&
Kategorie: Hacking & Security

U.S. Government Releases New AI Security Guidelines for Critical Infrastructure

30 Duben, 2024 - 12:36
The U.S. government has unveiled new security guidelines aimed at bolstering critical infrastructure against artificial intelligence (AI)-related threats. "These guidelines are informed by the whole-of-government effort to assess AI risks across all sixteen critical infrastructure sectors, and address threats both to and from, and involving AI systems," the Department of Homeland Security (DHS)&Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security