The Hacker News

Syndikovat obsah
The Hacker News has been internationally recognized as a leading news source dedicated to promoting awareness for security experts and [email protected]
Aktualizace: 6 min 32 sek zpět

Check Point Warns of Zero-Day Attacks on its VPN Gateway Products

2 hodiny 1 min zpět
Check Point is warning of a zero-day vulnerability in its Network Security gateway products that threat actors have exploited in the wild. Tracked as CVE-2024-24919, the issue impacts CloudGuard Network, Quantum Maestro, Quantum Scalable Chassis, Quantum Security Gateways, and Quantum Spark appliances. "The vulnerability potentially allows an attacker to read certain information on Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Brazilian Banks Targeted by New AllaKore RAT Variant Called AllaSenha

2 hodiny 39 min zpět
Brazilian banking institutions are the target of a new campaign that distributes a custom variant of the Windows-based AllaKore remote access trojan (RAT) called AllaSenha. The malware is "specifically aimed at stealing credentials that are required to access Brazilian bank accounts, [and] leverages Azure cloud as command-and-control (C2) infrastructure," French cybersecurity company HarfangLab Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

U.S. Sentences 31-Year-Old to 10 Years for Laundering $4.5M in Email Scams

5 hodin 47 min zpět
The U.S. Department of Justice (DoJ) has sentenced a 31-year-old man to 10 years in prison for laundering more than $4.5 million through business email compromise (BEC) schemes and romance scams. Malachi Mullings, 31, of Sandy Springs, Georgia pleaded guilty to the money laundering offenses in January 2023. According to court documents, Mullings is said to have opened 20 bank accounts in the Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

New Research Warns About Weak Offboarding Management and Insider Risks

6 hodin 6 min zpět
A recent study by Wing Security found that 63% of businesses may have former employees with access to organizational data, and that automating SaaS Security can help mitigate offboarding risks.  Employee offboarding is typically seen as a routine administrative task, but it can pose substantial security risks, if not handled correctly. Failing to quickly and thoroughly remove access for Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Microsoft Uncovers 'Moonstone Sleet' — New North Korean Hacker Group

7 hodin 2 min zpět
A never-before-seen North Korean threat actor codenamed Moonstone Sleet has been attributed as behind cyber attacks targeting individuals and organizations in the software and information technology, education, and defense industrial base sectors with ransomware and bespoke malware previously associated with the infamous Lazarus Group. "Moonstone Sleet is observed to set up fake companies and Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

BreachForums Returns Just Weeks After FBI Seizure - Honeypot or Blunder?

10 hodin 26 min zpět
The online criminal bazaar BreachForums has been resurrected merely two weeks after a U.S.-led coordinated law enforcement action dismantled and seized control of its infrastructure. Cybersecurity researchers and dark web trackers Brett Callow, Dark Web Informer, and FalconFeeds revealed the site's online return at breachforums[.]st – one of the dismantled sites – by a user named ShinyHunters, Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Indian National Pleads Guilty to $37 Million Cryptocurrency Theft Scheme

28 Květen, 2024 - 14:50
An Indian national has pleaded guilty in the U.S. over charges of stealing more than $37 million by setting up a website that impersonated the Coinbase cryptocurrency exchange platform. Chirag Tomar, 30, pleaded guilty to wire fraud conspiracy, which carries a maximum sentence of 20 years in prison and a $250,000 fine. He was arrested on December 20, 2023, upon entering the country. "Tomar and Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

4-Step Approach to Mapping and Securing Your Organization's Most Critical Assets

28 Květen, 2024 - 13:12
You’re probably familiar with the term “critical assets”. These are the technology assets within your company's IT infrastructure that are essential to the functioning of your organization. If anything happens to these assets, such as application servers, databases, or privileged identities, the ramifications to your security posture can be severe.  But is every technology asset considered The Hacker Newshttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Researchers Warn of CatDDoS Botnet and DNSBomb DDoS Attack Technique

28 Květen, 2024 - 12:15
The threat actors behind the CatDDoS malware botnet have exploited over 80 known security flaws in various software over the past three months to infiltrate vulnerable devices and co-opt them into a botnet for conducting distributed denial-of-service (DDoS) attacks. "CatDDoS-related gangs' samples have used a large number of known vulnerabilities to deliver samples," the QiAnXin XLab team Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

WordPress Plugin Exploited to Steal Credit Card Data from E-commerce Sites

28 Květen, 2024 - 08:30
Unknown threat actors are abusing lesser-known code snippet plugins for WordPress to insert malicious PHP code in victim sites that are capable of harvesting credit card data. The campaign, observed by Sucuri on May 11, 2024, entails the abuse of a WordPress plugin called Dessky Snippets, which allows users to add custom PHP code. It has over 200 active installations. Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

WordPress Plugin Exploited to Steal Credit Card Data from E-commerce Sites

28 Květen, 2024 - 08:30
Unknown threat actors are abusing lesser-known code snippet plugins for WordPress to insert malicious PHP code in victim sites that are capable of harvesting credit card data. The campaign, observed by Sucuri on May 11, 2024, entails the abuse of a WordPress plugin called Dessky Snippets, which allows users to add custom PHP code. It has over 200 active installations.
Kategorie: Hacking & Security

TP-Link Gaming Router Vulnerability Exposes Users to Remote Code Attacks

28 Květen, 2024 - 07:11
A maximum-severity security flaw has been disclosed in the TP-Link Archer C5400X gaming router that could lead to remote code execution on susceptible devices by sending specially crafted requests. The vulnerability, tracked as CVE-2024-5035, carries a CVSS score of 10.0. It impacts all versions of the router firmware including and prior to 1_1.1.6. It has&nbsp
Kategorie: Hacking & Security

TP-Link Gaming Router Vulnerability Exposes Users to Remote Code Attacks

28 Květen, 2024 - 07:11
A maximum-severity security flaw has been disclosed in the TP-Link Archer C5400X gaming router that could lead to remote code execution on susceptible devices by sending specially crafted requests. The vulnerability, tracked as CVE-2024-5035, carries a CVSS score of 10.0. It impacts all versions of the router firmware including and prior to 1_1.1.6. It has&nbspNewsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Moroccan Cybercrime Group Steals Up to $100K Daily Through Gift Card Fraud

27 Květen, 2024 - 14:12
Microsoft is calling attention to a Morocco-based cybercrime group dubbed Storm-0539 that's behind gift card fraud and theft through highly sophisticated email and SMS phishing attacks. "Their primary motivation is to steal gift cards and profit by selling them online at a discounted rate," the company said in its latest Cyber Signals report. "We've seen some examples where
Kategorie: Hacking & Security

Moroccan Cybercrime Group Steals Up to $100K Daily Through Gift Card Fraud

27 Květen, 2024 - 14:12
Microsoft is calling attention to a Morocco-based cybercrime group dubbed Storm-0539 that's behind gift card fraud and theft through highly sophisticated email and SMS phishing attacks. "Their primary motivation is to steal gift cards and profit by selling them online at a discounted rate," the company said in its latest Cyber Signals report. "We've seen some examples where Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Report: The Dark Side of Phishing Protection

27 Květen, 2024 - 13:46
The transition to the cloud, poor password hygiene and the evolution in webpage technologies have all enabled the rise in phishing attacks. But despite sincere efforts by security stakeholders to mitigate them - through email protection, firewall rules and employee education - phishing attacks are still a very risky attack vector. A new report by LayerX explores the state of
Kategorie: Hacking & Security

Report: The Dark Side of Phishing Protection

27 Květen, 2024 - 13:46
The transition to the cloud, poor password hygiene and the evolution in webpage technologies have all enabled the rise in phishing attacks. But despite sincere efforts by security stakeholders to mitigate them - through email protection, firewall rules and employee education - phishing attacks are still a very risky attack vector. A new report by LayerX explores the state of The Hacker Newshttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

New Tricks in the Phishing Playbook: Cloudflare Workers, HTML Smuggling, GenAI

27 Květen, 2024 - 11:02
Cybersecurity researchers are alerting of phishing campaigns that abuse Cloudflare Workers to serve phishing sites that are used to harvest users' credentials associated with Microsoft, Gmail, Yahoo!, and cPanel Webmail. The attack method, called transparent phishing or adversary-in-the-middle (AitM) phishing, "uses Cloudflare Workers to act as a reverse proxy server for a
Kategorie: Hacking & Security

New Tricks in the Phishing Playbook: Cloudflare Workers, HTML Smuggling, GenAI

27 Květen, 2024 - 11:02
Cybersecurity researchers are alerting of phishing campaigns that abuse Cloudflare Workers to serve phishing sites that are used to harvest users' credentials associated with Microsoft, Gmail, Yahoo!, and cPanel Webmail. The attack method, called transparent phishing or adversary-in-the-middle (AitM) phishing, "uses Cloudflare Workers to act as a reverse proxy server for a Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Pakistan-linked Hackers Deploy Python, Golang, and Rust Malware on Indian Targets

27 Květen, 2024 - 08:31
The Pakistan-nexus Transparent Tribe actor has been linked to a new set of attacks targeting Indian government, defense, and aerospace sectors using cross-platform malware written in Python, Golang, and Rust. "This cluster of activity spanned from late 2023 to April 2024 and is anticipated to persist," the BlackBerry Research and Intelligence Team said in a technical report
Kategorie: Hacking & Security