The Hacker News

Syndikovat obsah
The Hacker News has been internationally recognized as a leading news source dedicated to promoting awareness for security experts and [email protected]
Aktualizace: 10 min 25 sek zpět

Intel and Lenovo BMCs Contain Unpatched Lighttpd Server Flaw

15 Duben, 2024 - 18:51
A security flaw impacting the Lighttpd web server used in baseboard management controllers (BMCs) has remained unpatched by device vendors like Intel and Lenovo, new findings from Binarly reveal. While the original shortcoming was discovered and patched by the Lighttpd maintainers way back in August 2018 with version 1.4.51, the lack of a CVE identifier or an advisory meant that
Kategorie: Hacking & Security

Intel and Lenovo BMCs Contain Unpatched Lighttpd Server Flaw

15 Duben, 2024 - 18:51
A security flaw impacting the Lighttpd web server used in baseboard management controllers (BMCs) has remained unpatched by device vendors like Intel and Lenovo, new findings from Binarly reveal. While the original shortcoming was discovered and patched by the Lighttpd maintainers way back in August 2018 with version 1.4.51, the lack of a CVE identifier or an advisory meant that Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

AI Copilot: Launching Innovation Rockets, But Beware of the Darkness Ahead

15 Duben, 2024 - 15:30
Imagine a world where the software that powers your favorite apps, secures your online transactions, and keeps your digital life could be outsmarted and taken over by a cleverly disguised piece of code. This isn't a plot from the latest cyber-thriller; it's actually been a reality for years now. How this will change – in a positive or negative direction – as artificial intelligence (AI) takes on
Kategorie: Hacking & Security

AI Copilot: Launching Innovation Rockets, But Beware of the Darkness Ahead

15 Duben, 2024 - 15:30
Imagine a world where the software that powers your favorite apps, secures your online transactions, and keeps your digital life could be outsmarted and taken over by a cleverly disguised piece of code. This isn't a plot from the latest cyber-thriller; it's actually been a reality for years now. How this will change – in a positive or negative direction – as artificial intelligence (AI) takes onThe Hacker Newshttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Muddled Libra Shifts Focus to SaaS and Cloud for Extortion and Data Theft Attacks

15 Duben, 2024 - 15:29
The threat actor known as Muddled Libra has been observed actively targeting software-as-a-service (SaaS) applications and cloud service provider (CSP) environments in a bid to exfiltrate sensitive data. "Organizations often store a variety of data in SaaS applications and use services from CSPs," Palo Alto Networks Unit 42 said in a report published last week. "The threat
Kategorie: Hacking & Security

Muddled Libra Shifts Focus to SaaS and Cloud for Extortion and Data Theft Attacks

15 Duben, 2024 - 15:29
The threat actor known as Muddled Libra has been observed actively targeting software-as-a-service (SaaS) applications and cloud service provider (CSP) environments in a bid to exfiltrate sensitive data. "Organizations often store a variety of data in SaaS applications and use services from CSPs," Palo Alto Networks Unit 42 said in a report published last week. "The threat Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Timing is Everything: The Role of Just-in-Time Privileged Access in Security Evolution

15 Duben, 2024 - 12:21
To minimize the risk of privilege misuse, a trend in the privileged access management (PAM) solution market involves implementing just-in-time (JIT) privileged access. This approach to privileged identity management aims to mitigate the risks associated with prolonged high-level access by granting privileges temporarily and only when necessary, rather than providing users with
Kategorie: Hacking & Security

Timing is Everything: The Role of Just-in-Time Privileged Access in Security Evolution

15 Duben, 2024 - 12:21
To minimize the risk of privilege misuse, a trend in the privileged access management (PAM) solution market involves implementing just-in-time (JIT) privileged access. This approach to privileged identity management aims to mitigate the risks associated with prolonged high-level access by granting privileges temporarily and only when necessary, rather than providing users with The Hacker Newshttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Chinese-Linked LightSpy iOS Spyware Targets South Asian iPhone Users

15 Duben, 2024 - 11:04
Cybersecurity researchers have discovered a "renewed" cyber espionage campaign targeting users in South Asia with the aim of delivering an Apple iOS spyware implant called LightSpy. "The latest iteration of LightSpy, dubbed 'F_Warehouse,' boasts a modular framework with extensive spying features," the BlackBerry Threat Research and Intelligence Team said in a report published last
Kategorie: Hacking & Security

Chinese-Linked LightSpy iOS Spyware Targets South Asian iPhone Users

15 Duben, 2024 - 11:04
Cybersecurity researchers have discovered a "renewed" cyber espionage campaign targeting users in South Asia with the aim of delivering an Apple iOS spyware implant called LightSpy. "The latest iteration of LightSpy, dubbed 'F_Warehouse,' boasts a modular framework with extensive spying features," the BlackBerry Threat Research and Intelligence Team said in a report published lastNewsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Palo Alto Networks Releases Urgent Fixes for Exploited PAN-OS Vulnerability

15 Duben, 2024 - 10:17
Palo Alto Networks has released hotfixes to address a maximum-severity security flaw impacting PAN-OS software that has come under active exploitation in the wild. Tracked as CVE-2024-3400 (CVSS score: 10.0), the critical vulnerability is a case of command injection in the GlobalProtect feature that an unauthenticated attacker could weaponize to execute arbitrary code with root
Kategorie: Hacking & Security

Palo Alto Networks Releases Urgent Fixes for Exploited PAN-OS Vulnerability

15 Duben, 2024 - 10:17
Palo Alto Networks has released hotfixes to address a maximum-severity security flaw impacting PAN-OS software that has come under active exploitation in the wild. Tracked as CVE-2024-3400 (CVSS score: 10.0), the critical vulnerability is a case of command injection in the GlobalProtect feature that an unauthenticated attacker could weaponize to execute arbitrary code with root Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Ex-Security Engineer Jailed 3 Years for $12.3 Million Crypto Exchange Thefts

13 Duben, 2024 - 16:25
A former security engineer has been sentenced to three years in prison in the U.S. for charges relating to hacking two decentralized cryptocurrency exchanges in July 2022 and stealing over $12.3 million. Shakeeb Ahmed, the defendant in question, pled guilty to one count of computer fraud in December 2023 following his arrest in July. "At the time of both attacks,
Kategorie: Hacking & Security

Ex-Security Engineer Jailed 3 Years for $12.3 Million Crypto Exchange Thefts

13 Duben, 2024 - 16:25
A former security engineer has been sentenced to three years in prison in the U.S. for charges relating to hacking two decentralized cryptocurrency exchanges in July 2022 and stealing over $12.3 million. Shakeeb Ahmed, the defendant in question, pled guilty to one count of computer fraud in December 2023 following his arrest in July. "At the time of both attacks, Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

U.S. Treasury Hamas Spokesperson for Cyber Influence Operations

13 Duben, 2024 - 15:58
The U.S. Treasury Department's Office of Foreign Assets Control (OFAC) on Friday announced sanctions against an official associated with Hamas for his involvement in cyber influence operations. Hudhayfa Samir ‘Abdallah al-Kahlut, 39, also known as Abu Ubaida, has served as the public spokesperson of Izz al-Din al-Qassam Brigades, the military wing of Hamas, since at least 2007. "He publicly
Kategorie: Hacking & Security

U.S. Treasury Hamas Spokesperson for Cyber Influence Operations

13 Duben, 2024 - 15:58
The U.S. Treasury Department's Office of Foreign Assets Control (OFAC) on Friday announced sanctions against an official associated with Hamas for his involvement in cyber influence operations. Hudhayfa Samir ‘Abdallah al-Kahlut, 39, also known as Abu Ubaida, has served as the public spokesperson of Izz al-Din al-Qassam Brigades, the military wing of Hamas, since at least 2007. "He publicly Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Hackers Deploy Python Backdoor in Palo Alto Zero-Day Attack

13 Duben, 2024 - 10:25
Threat actors have been exploiting the newly disclosed zero-day flaw in Palo Alto Networks PAN-OS software dating back to March 26, 2024, nearly three weeks before it came to light yesterday. The network security company's Unit 42 division is tracking the activity under the name Operation MidnightEclipse, attributing it as the work of a single threat actor of
Kategorie: Hacking & Security

Hackers Deploy Python Backdoor in Palo Alto Zero-Day Attack

13 Duben, 2024 - 10:25
Threat actors have been exploiting the newly disclosed zero-day flaw in Palo Alto Networks PAN-OS software dating back to March 26, 2024, nearly three weeks before it came to light yesterday. The network security company's Unit 42 division is tracking the activity under the name Operation MidnightEclipse, attributing it as the work of a single threat actor of Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Popular Rust Crate liblzma-sys Compromised with XZ Utils Backdoor Files

12 Duben, 2024 - 16:55
"Test files" associated with the XZ Utils backdoor have made their way to a Rust crate known as liblzma-sys, new findings from Phylum reveal. liblzma-sys, which has been downloaded over 21,000 times to date, provides Rust developers with bindings to the liblzma implementation, an underlying library that is part of the XZ Utils data compression software. The
Kategorie: Hacking & Security

Popular Rust Crate liblzma-sys Compromised with XZ Utils Backdoor Files

12 Duben, 2024 - 16:55
"Test files" associated with the XZ Utils backdoor have made their way to a Rust crate known as liblzma-sys, new findings from Phylum reveal. liblzma-sys, which has been downloaded over 21,000 times to date, provides Rust developers with bindings to the liblzma implementation, an underlying library that is part of the XZ Utils data compression software. The Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security