The Hacker News

Syndikovat obsah
The Hacker News has been internationally recognized as a leading news source dedicated to promoting awareness for security experts and [email protected]
Aktualizace: 4 sek zpět

Detecting Windows-based Malware Through Better Visibility

1 Duben, 2024 - 13:20
Despite a plethora of available security solutions, more and more organizations fall victim to Ransomware and other threats. These continued threats aren't just an inconvenience that hurt businesses and end users - they damage the economy, endanger lives, destroy businesses and put national security at risk. But if that wasn’t enough – North Korea appears to be using revenue from cyber The Hacker Newshttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Malicious Apps Caught Secretly Turning Android Phones into Proxies for Cybercriminals

1 Duben, 2024 - 12:10
Several malicious Android apps that turn mobile devices running the operating system into residential proxies (RESIPs) for other threat actors have been observed on the Google Play Store. The findings come from HUMAN's Satori Threat Intelligence team, which said the cluster of VPN apps came fitted with a Golang library that transformed the user's device into a proxy node without their knowledge.
Kategorie: Hacking & Security

Malicious Apps Caught Secretly Turning Android Phones into Proxies for Cybercriminals

1 Duben, 2024 - 12:10
Several malicious Android apps that turn mobile devices running the operating system into residential proxies (RESIPs) for other threat actors have been observed on the Google Play Store. The findings come from HUMAN's Satori Threat Intelligence team, which said the cluster of VPN apps came fitted with a Golang library that transformed the user's device into a proxy node without their knowledge.Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Vultur Android Banking Trojan Returns with Upgraded Remote Control Capabilities

1 Duben, 2024 - 08:04
The Android banking trojan known as Vultur has resurfaced with a suite of new features and improved anti-analysis and detection evasion techniques, enabling its operators to remotely interact with a mobile device and harvest sensitive data. "Vultur has also started masquerading more of its malicious activity by encrypting its C2 communication, using multiple encrypted payloads that are decrypted
Kategorie: Hacking & Security

Vultur Android Banking Trojan Returns with Upgraded Remote Control Capabilities

1 Duben, 2024 - 08:04
The Android banking trojan known as Vultur has resurfaced with a suite of new features and improved anti-analysis and detection evasion techniques, enabling its operators to remotely interact with a mobile device and harvest sensitive data. "Vultur has also started masquerading more of its malicious activity by encrypting its C2 communication, using multiple encrypted payloads that are decryptedNewsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Hackers Target macOS Users with Malicious Ads Spreading Stealer Malware

30 Březen, 2024 - 09:16
Malicious ads and bogus websites are acting as a conduit to deliver two different stealer malware, including Atomic Stealer, targeting Apple macOS users. The ongoing infostealer attacks targeting macOS users may have adopted different methods to compromise victims' Macs, but operate with the end goal of stealing sensitive data, Jamf Threat Labs said in a report published Friday. One
Kategorie: Hacking & Security

Hackers Target macOS Users with Malicious Ads Spreading Stealer Malware

30 Březen, 2024 - 09:16
Malicious ads and bogus websites are acting as a conduit to deliver two different stealer malware, including Atomic Stealer, targeting Apple macOS users. The ongoing infostealer attacks targeting macOS users may have adopted different methods to compromise victims' Macs, but operate with the end goal of stealing sensitive data, Jamf Threat Labs said in a report published Friday. One Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Urgent: Secret Backdoor Found in XZ Utils Library, Impacts Major Linux Distros

30 Březen, 2024 - 07:23
Red Hat on Friday released an "urgent security alert" warning that two versions of a popular data compression library called XZ Utils (previously LZMA Utils) have been backdoored with malicious code designed to allow unauthorized remote access. The software supply chain compromise, tracked as CVE-2024-3094, has a CVSS score of 10.0, indicating maximum severity. It impacts XZ Utils
Kategorie: Hacking & Security

Urgent: Secret Backdoor Found in XZ Utils Library, Impacts Major Linux Distros

30 Březen, 2024 - 07:23
Red Hat on Friday released an "urgent security alert" warning that two versions of a popular data compression library called XZ Utils (previously LZMA Utils) have been backdoored with malicious code designed to allow unauthorized remote access. The software supply chain compromise, tracked as CVE-2024-3094, has a CVSS score of 10.0, indicating maximum severity. It impacts XZ UtilsNewsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security