The Hacker News

Syndikovat obsah
The Hacker News has been internationally recognized as a leading news source dedicated to promoting awareness for security experts and [email protected]
Aktualizace: 49 min 26 sek zpět

Critical Apache HugeGraph Vulnerability Under Attack - Patch ASAP

17 Červenec, 2024 - 07:25
Threat actors are actively exploiting a recently disclosed critical security flaw impacting Apache HugeGraph-Server that could lead to remote code execution attacks. Tracked as CVE-2024-27348 (CVSS score: 9.8), the vulnerability impacts all versions of the software before 1.3.0. It has been described as a remote command execution flaw in the Gremlin graph traversal language API. "Users are Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

'Konfety' Ad Fraud Uses 250+ Google Play Decoy Apps to Hide Malicious Twins

16 Červenec, 2024 - 15:00
Details have emerged about a "massive ad fraud operation" that leverages hundreds of apps on the Google Play Store to perform a host of nefarious activities. The campaign has been codenamed Konfety – the Russian word for Candy – owing to its abuse of a mobile advertising software development kit (SDK) associated with a Russia-based ad network called CaramelAds. "Konfety represents a new form of
Kategorie: Hacking & Security

'Konfety' Ad Fraud Uses 250+ Google Play Decoy Apps to Hide Malicious Twins

16 Červenec, 2024 - 15:00
Details have emerged about a "massive ad fraud operation" that leverages hundreds of apps on the Google Play Store to perform a host of nefarious activities. The campaign has been codenamed Konfety – the Russian word for Candy – owing to its abuse of a mobile advertising software development kit (SDK) associated with a Russia-based ad network called CaramelAds. "Konfety represents a new form of Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Threat Prevention & Detection in SaaS Environments - 101

16 Červenec, 2024 - 13:00
Identity-based threats on SaaS applications are a growing concern among security professionals, although few have the capabilities to detect and respond to them.  According to the US Cybersecurity and Infrastructure Security Agency (CISA), 90% of all cyberattacks begin with phishing, an identity-based threat. Throw in attacks that use stolen credentials, over-provisioned accounts, and
Kategorie: Hacking & Security

Threat Prevention & Detection in SaaS Environments - 101

16 Červenec, 2024 - 13:00
Identity-based threats on SaaS applications are a growing concern among security professionals, although few have the capabilities to detect and respond to them.  According to the US Cybersecurity and Infrastructure Security Agency (CISA), 90% of all cyberattacks begin with phishing, an identity-based threat. Throw in attacks that use stolen credentials, over-provisioned accounts, and The Hacker Newshttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Malicious npm Packages Found Using Image Files to Hide Backdoor Code

16 Červenec, 2024 - 12:09
Cybersecurity researchers have identified two malicious packages on the npm package registry that concealed backdoor code to execute malicious commands sent from a remote server. The packages in question – img-aws-s3-object-multipart-copy and legacyaws-s3-object-multipart-copy – have been downloaded 190 and 48 times each. As of writing, they have been taken down by the npm security team. "They
Kategorie: Hacking & Security

Malicious npm Packages Found Using Image Files to Hide Backdoor Code

16 Červenec, 2024 - 12:09
Cybersecurity researchers have identified two malicious packages on the npm package registry that concealed backdoor code to execute malicious commands sent from a remote server. The packages in question – img-aws-s3-object-multipart-copy and legacyaws-s3-object-multipart-copy – have been downloaded 190 and 48 times each. As of writing, they have been taken down by the npm security team. "They Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Iranian Hackers Deploy New BugSleep Backdoor in Middle East Cyber Attacks

16 Červenec, 2024 - 11:13
The Iranian nation-state actor known as MuddyWater has been observed using a never-before-seen backdoor as part of a recent attack campaign, shifting away from its well-known tactic of deploying legitimate remote monitoring and management (RMM) software for maintaining persistent access. That's according to independent findings from cybersecurity firms Check Point and Sekoia, which have
Kategorie: Hacking & Security

Iranian Hackers Deploy New BugSleep Backdoor in Middle East Cyber Attacks

16 Červenec, 2024 - 11:13
The Iranian nation-state actor known as MuddyWater has been observed using a never-before-seen backdoor as part of a recent attack campaign, shifting away from its well-known tactic of deploying legitimate remote monitoring and management (RMM) software for maintaining persistent access. That's according to independent findings from cybersecurity firms Check Point and Sekoia, which have Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Void Banshee APT Exploits Microsoft MHTML Flaw to Spread Atlantida Stealer

16 Červenec, 2024 - 11:00
An advanced persistent threat (APT) group called Void Banshee has been observed exploiting a recently disclosed security flaw in the Microsoft MHTML browser engine as a zero-day to deliver an information stealer called Atlantida. Cybersecurity firm Trend Micro, which observed the activity in mid-May 2024, said the vulnerability – tracked as CVE-2024-38112 – was used as part of a multi-stage
Kategorie: Hacking & Security

Void Banshee APT Exploits Microsoft MHTML Flaw to Spread Atlantida Stealer

16 Červenec, 2024 - 11:00
An advanced persistent threat (APT) group called Void Banshee has been observed exploiting a recently disclosed security flaw in the Microsoft MHTML browser engine as a zero-day to deliver an information stealer called Atlantida. Cybersecurity firm Trend Micro, which observed the activity in mid-May 2024, the vulnerability – tracked as CVE-2024-38112 – was used as part of a multi-stage attack Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Kaspersky Exits U.S. Market Following Commerce Department Ban

16 Červenec, 2024 - 06:16
Russian security vendor Kaspersky has said it's exiting the U.S. market nearly a month after the Commerce Department announced a ban on the sale of its software in the country citing a national security risk. News of the closure was first reported by journalist Kim Zetter. The company is expected to wind down its U.S. operations on July 20, 2024, the same day the ban comes into effect. It's also
Kategorie: Hacking & Security

Kaspersky Exits U.S. Market Following Commerce Department Ban

16 Červenec, 2024 - 06:16
Russian security vendor Kaspersky has said it's exiting the U.S. market nearly a month after the Commerce Department announced a ban on the sale of its software in the country citing a national security risk. News of the closure was first reported by journalist Kim Zetter. The company is expected to wind down its U.S. operations on July 20, 2024, the same day the ban comes into effect. It's alsoNewsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

CISA Warns of Actively Exploited RCE Flaw in GeoServer GeoTools Software

16 Červenec, 2024 - 06:01
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a critical security flaw impacting OSGeo GeoServer GeoTools to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. GeoServer is an open-source software server written in Java that allows users to share and edit geospatial data. It is the reference implementation of the Open
Kategorie: Hacking & Security

CISA Warns of Actively Exploited RCE Flaw in GeoServer GeoTools Software

16 Červenec, 2024 - 06:01
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a critical security flaw impacting OSGeo GeoServer GeoTools to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. GeoServer is an open-source software server written in Java that allows users to share and edit geospatial data. It is the reference implementation of the Open Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

GitHub Token Leak Exposes Python's Core Repositories to Potential Attacks

15 Červenec, 2024 - 18:18
Cybersecurity researchers said they discovered an accidentally leaked GitHub token that could have granted elevated access to the GitHub repositories of the Python language, Python Package Index (PyPI), and the Python Software Foundation (PSF). JFrog, which found the GitHub Personal Access Token, said the secret was leaked in a public Docker container hosted on Docker Hub. "This case was
Kategorie: Hacking & Security

GitHub Token Leak Exposes Python's Core Repositories to Potential Attacks

15 Červenec, 2024 - 18:18
Cybersecurity researchers said they discovered an accidentally leaked GitHub token that could have granted elevated access to the GitHub repositories of the Python language, Python Package Index (PyPI), and the Python Software Foundation (PSF). JFrog, which found the GitHub Personal Access Token, said the secret was leaked in a public Docker container hosted on Docker Hub. "This case was Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

10,000 Victims a Day: Infostealer Garden of Low-Hanging Fruit

15 Červenec, 2024 - 12:52
Imagine you could gain access to any Fortune 100 company for $10 or less, or even for free. Terrifying thought, isn’t it? Or exciting, depending on which side of the cybersecurity barricade you are on. Well, that’s basically the state of things today. Welcome to the infostealer garden of low-hanging fruit. Over the last few years, the problem has grown bigger and bigger, and only now are we
Kategorie: Hacking & Security

10,000 Victims a Day: Infostealer Garden of Low-Hanging Fruit

15 Červenec, 2024 - 12:52
Imagine you could gain access to any Fortune 100 company for $10 or less, or even for free. Terrifying thought, isn’t it? Or exciting, depending on which side of the cybersecurity barricade you are on. Well, that’s basically the state of things today. Welcome to the infostealer garden of low-hanging fruit. Over the last few years, the problem has grown bigger and bigger, and only now are we The Hacker Newshttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

CRYSTALRAY Hackers Infect Over 1,500 Victims Using Network Mapping Tool

15 Červenec, 2024 - 12:24
A threat actor that was previously observed using an open-source network mapping tool has greatly expanded their operations to infect over 1,500 victims. Sysdig, which is tracking the cluster under the name CRYSTALRAY, said the activities have witnessed a tenfold surge, adding it includes "mass scanning, exploiting multiple vulnerabilities, and placing backdoors using multiple [open-source
Kategorie: Hacking & Security