The Hacker News

Syndikovat obsah
The Hacker News has been internationally recognized as a leading news source dedicated to promoting awareness for security experts and [email protected]
Aktualizace: 1 min 9 sek zpět

Black Basta Ransomware Strikes 500+ Entities Across North America, Europe, and Australia

13 Květen, 2024 - 12:01
The Black Basta ransomware-as-a-service (RaaS) operation has targeted more than 500 private industry and critical infrastructure entities in North America, Europe, and Australia since its emergence in April 2022. In a joint advisory published by the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), the Department of Health and Human Services (HHS
Kategorie: Hacking & Security

Black Basta Ransomware Strikes 500+ Entities Across North America, Europe, and Australia

13 Květen, 2024 - 12:01
The Black Basta ransomware-as-a-service (RaaS) operation has targeted more than 500 private industry and critical infrastructure entities in North America, Europe, and Australia since its emergence in April 2022. In a joint advisory published by the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), the Department of Health and Human Services (HHSNewsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Malicious Python Package Hides Sliver C2 Framework in Fake Requests Library Logo

13 Květen, 2024 - 08:18
Cybersecurity researchers have identified a malicious Python package that purports to be an offshoot of the popular requests library and has been found concealing a Golang-version of the Sliver command-and-control (C2) framework within a PNG image of the project's logo.  The package employing this steganographic trickery is requests-darwin-lite, which has been
Kategorie: Hacking & Security

Malicious Python Package Hides Sliver C2 Framework in Fake Requests Library Logo

13 Květen, 2024 - 08:18
Cybersecurity researchers have identified a malicious Python package that purports to be an offshoot of the popular requests library and has been found concealing a Golang-version of the Sliver command-and-control (C2) framework within a PNG image of the project's logo.  The package employing this steganographic trickery is requests-darwin-lite, which has been Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

FIN7 Hacker Group Leverages Malicious Google Ads to Deliver NetSupport RAT

11 Květen, 2024 - 09:29
The financially motivated threat actor known as FIN7 has been observed leveraging malicious Google ads spoofing legitimate brands as a means to deliver MSIX installers that culminate in the deployment of NetSupport RAT. "The threat actors used malicious websites to impersonate well-known brands, including AnyDesk, WinSCP, BlackRock, Asana, Concur, The Wall
Kategorie: Hacking & Security

FIN7 Hacker Group Leverages Malicious Google Ads to Deliver NetSupport RAT

11 Květen, 2024 - 09:29
The financially motivated threat actor known as FIN7 has been observed leveraging malicious Google ads spoofing legitimate brands as a means to deliver MSIX installers that culminate in the deployment of NetSupport RAT. "The threat actors used malicious websites to impersonate well-known brands, including AnyDesk, WinSCP, BlackRock, Asana, Concur, The Wall Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

North Korean Hackers Deploy New Golang Malware 'Durian' Against Crypto Firms

10 Květen, 2024 - 16:54
The North Korean threat actor tracked as Kimsuky has been observed deploying a previously undocumented Golang-based malware dubbed Durian as part of highly-targeted cyber attacks aimed at two South Korean cryptocurrency firms. "Durian boasts comprehensive backdoor functionality, enabling the execution of delivered commands, additional file downloads, and exfiltration of files,"
Kategorie: Hacking & Security

North Korean Hackers Deploy New Golang Malware 'Durian' Against Crypto Firms

10 Květen, 2024 - 16:54
The North Korean threat actor tracked as Kimsuky has been observed deploying a previously undocumented Golang-based malware dubbed Durian as part of highly-targeted cyber attacks aimed at two South Korean cryptocurrency firms. "Durian boasts comprehensive backdoor functionality, enabling the execution of delivered commands, additional file downloads, and exfiltration of files," Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

CensysGPT: AI-Powered Threat Hunting for Cybersecurity Pros (Webinar)

10 Květen, 2024 - 14:52
Artificial intelligence (AI) is transforming cybersecurity, and those leading the charge are using it to outsmart increasingly advanced cyber threats. Join us for an exciting webinar, "The Future of Threat Hunting is Powered by Generative AI," where you'll explore how AI tools are shaping the future of cybersecurity defenses. During the session, Censys Security Researcher Aidan Holland will
Kategorie: Hacking & Security

CensysGPT: AI-Powered Threat Hunting for Cybersecurity Pros (Webinar)

10 Květen, 2024 - 14:52
Artificial intelligence (AI) is transforming cybersecurity, and those leading the charge are using it to outsmart increasingly advanced cyber threats. Join us for an exciting webinar, "The Future of Threat Hunting is Powered by Generative AI," where you'll explore how AI tools are shaping the future of cybersecurity defenses. During the session, Censys Security Researcher Aidan Holland will The Hacker Newshttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Chrome Zero-Day Alert — Update Your Browser to Patch New Vulnerability

10 Květen, 2024 - 12:23
Google on Thursday released security updates to address a zero-day flaw in Chrome that it said has been actively exploited in the wild. Tracked as CVE-2024-4671, the high-severity vulnerability has been described as a case of use-after-free in the Visuals component. It was reported by an anonymous researcher on May 7, 2024. Use-after-free bugs, which arise when a program
Kategorie: Hacking & Security

Chrome Zero-Day Alert — Update Your Browser to Patch New Vulnerability

10 Květen, 2024 - 12:23
Google on Thursday released security updates to address a zero-day flaw in Chrome that it said has been actively exploited in the wild. Tracked as CVE-2024-4671, the high-severity vulnerability has been described as a case of use-after-free in the Visuals component. It was reported by an anonymous researcher on May 7, 2024. Use-after-free bugs, which arise when a program Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

What's the Right EDR for You?

10 Květen, 2024 - 12:22
A guide to finding the right endpoint detection and response (EDR) solution for your business’ unique needs. Cybersecurity has become an ongoing battle between hackers and small- and mid-sized businesses. Though perimeter security measures like antivirus and firewalls have traditionally served as the frontlines of defense, the battleground has shifted to endpoints. This is why endpoint
Kategorie: Hacking & Security

What's the Right EDR for You?

10 Květen, 2024 - 12:22
A guide to finding the right endpoint detection and response (EDR) solution for your business’ unique needs. Cybersecurity has become an ongoing battle between hackers and small- and mid-sized businesses. Though perimeter security measures like antivirus and firewalls have traditionally served as the frontlines of defense, the battleground has shifted to endpoints. This is why endpointThe Hacker Newshttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Malicious Android Apps Pose as Google, Instagram, WhatsApp to Steal Credentials

10 Květen, 2024 - 12:21
Malicious Android apps masquerading as Google, Instagram, Snapchat, WhatsApp, and X (formerly Twitter) have been observed to steal users' credentials from compromised devices. "This malware uses famous Android app icons to mislead users and trick victims into installing the malicious app on their devices," the SonicWall Capture Labs threat research team said in a recent report. The
Kategorie: Hacking & Security

Malicious Android Apps Pose as Google, Instagram, WhatsApp to Steal Credentials

10 Květen, 2024 - 12:21
Malicious Android apps masquerading as Google, Instagram, Snapchat, WhatsApp, and X (formerly Twitter) have been observed to steal users' credentials from compromised devices. "This malware uses famous Android app icons to mislead users and trick victims into installing the malicious app on their devices," the SonicWall Capture Labs threat research team said in a recent report. The Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Researchers Uncover 'LLMjacking' Scheme Targeting Cloud-Hosted AI Models

10 Květen, 2024 - 09:41
Cybersecurity researchers have discovered a novel attack that employs stolen cloud credentials to target cloud-hosted large language model (LLM) services with the goal of selling access to other threat actors. The attack technique has been codenamed LLMjacking by the Sysdig Threat Research Team. "Once initial access was obtained, they exfiltrated cloud credentials and gained
Kategorie: Hacking & Security

Researchers Uncover 'LLMjacking' Scheme Targeting Cloud-Hosted AI Models

10 Květen, 2024 - 09:41
Cybersecurity researchers have discovered a novel attack that employs stolen cloud credentials to target cloud-hosted large language model (LLM) services with the goal of selling access to other threat actors. The attack technique has been codenamed LLMjacking by the Sysdig Threat Research Team. "Once initial access was obtained, they exfiltrated cloud credentials and gained Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

New TunnelVision Attack Allows Hijacking of VPN Traffic via DHCP Manipulation

9 Květen, 2024 - 19:55
Researchers have detailed a Virtual Private Network (VPN) bypass technique dubbed TunnelVision that allows threat actors to snoop on victim's network traffic by just being on the same local network. The "decloaking" method has been assigned the CVE identifier CVE-2024-3661 (CVSS score: 7.6). It impacts all operating systems that implement a DHCP client and has
Kategorie: Hacking & Security

New TunnelVision Attack Allows Hijacking of VPN Traffic via DHCP Manipulation

9 Květen, 2024 - 19:55
Researchers have detailed a Virtual Private Network (VPN) bypass technique dubbed TunnelVision that allows threat actors to snoop on victim's network traffic by just being on the same local network. The "decloaking" method has been assigned the CVE identifier CVE-2024-3661 (CVSS score: 7.6). It impacts all operating systems that implement a DHCP client and has Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security