The Hacker News

Syndikovat obsah
The Hacker News has been internationally recognized as a leading news source dedicated to promoting awareness for security experts and [email protected]
Aktualizace: 57 min 27 sek zpět

Google to Delete Billions of Browsing Records in 'Incognito Mode' Privacy Lawsuit Settlement

2 Duben, 2024 - 09:08
Google has agreed to purge billions of data records reflecting users' browsing activities to settle a class action lawsuit that claimed the search giant tracked them without their knowledge or consent in its Chrome browser. The class action, filed in 2020, alleged the company misled users by tracking their internet browsing activity who thought that it remained private when using the "Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Massive Phishing Campaign Strikes Latin America: Venom RAT Targeting Multiple Sectors

2 Duben, 2024 - 06:54
The threat actor known as TA558 has been attributed to a new massive phishing campaign that targets a wide range of sectors in Latin America with the goal of deploying Venom RAT. The attacks primarily singled out hotel, travel, trading, financial, manufacturing, industrial, and government verticals in Spain, Mexico, the United States, Colombia, Portugal, Brazil, Dominican Republic, and
Kategorie: Hacking & Security

Massive Phishing Campaign Strikes Latin America: Venom RAT Targeting Multiple Sectors

2 Duben, 2024 - 06:54
The threat actor known as TA558 has been attributed to a new massive phishing campaign that targets a wide range of sectors in Latin America with the goal of deploying Venom RAT. The attacks primarily singled out hotel, travel, trading, financial, manufacturing, industrial, and government verticals in Spain, Mexico, the United States, Colombia, Portugal, Brazil, Dominican Republic, andNewsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Indian Government Rescues 250 Citizens Forced into Cybercrime in Cambodia

1 Duben, 2024 - 15:51
The Indian government said it has rescued and repatriated about 250 citizens in Cambodia who were held captive and coerced into running cyber scams. The Indian nationals "were lured with employment opportunities to that country but were forced to undertake illegal cyber work," the Ministry of External Affairs (MEA) said in a statement, adding it had rescued 75 people in the past three
Kategorie: Hacking & Security

Indian Government Rescues 250 Citizens Forced into Cybercrime in Cambodia

1 Duben, 2024 - 15:51
The Indian government said it has rescued and repatriated about 250 citizens in Cambodia who were held captive and coerced into running cyber scams. The Indian nationals "were lured with employment opportunities to that country but were forced to undertake illegal cyber work," the Ministry of External Affairs (MEA) said in a statement, adding it had rescued 75 people in the past three Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Detecting Windows-based Malware Through Better Visibility

1 Duben, 2024 - 13:20
Despite a plethora of available security solutions, more and more organizations fall victim to Ransomware and other threats. These continued threats aren't just an inconvenience that hurt businesses and end users - they damage the economy, endanger lives, destroy businesses and put national security at risk. But if that wasn’t enough – North Korea appears to be using revenue from cyber
Kategorie: Hacking & Security

Detecting Windows-based Malware Through Better Visibility

1 Duben, 2024 - 13:20
Despite a plethora of available security solutions, more and more organizations fall victim to Ransomware and other threats. These continued threats aren't just an inconvenience that hurt businesses and end users - they damage the economy, endanger lives, destroy businesses and put national security at risk. But if that wasn’t enough – North Korea appears to be using revenue from cyber The Hacker Newshttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Malicious Apps Caught Secretly Turning Android Phones into Proxies for Cybercriminals

1 Duben, 2024 - 12:10
Several malicious Android apps that turn mobile devices running the operating system into residential proxies (RESIPs) for other threat actors have been observed on the Google Play Store. The findings come from HUMAN's Satori Threat Intelligence team, which said the cluster of VPN apps came fitted with a Golang library that transformed the user's device into a proxy node without their knowledge.
Kategorie: Hacking & Security

Malicious Apps Caught Secretly Turning Android Phones into Proxies for Cybercriminals

1 Duben, 2024 - 12:10
Several malicious Android apps that turn mobile devices running the operating system into residential proxies (RESIPs) for other threat actors have been observed on the Google Play Store. The findings come from HUMAN's Satori Threat Intelligence team, which said the cluster of VPN apps came fitted with a Golang library that transformed the user's device into a proxy node without their knowledge.Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Vultur Android Banking Trojan Returns with Upgraded Remote Control Capabilities

1 Duben, 2024 - 08:04
The Android banking trojan known as Vultur has resurfaced with a suite of new features and improved anti-analysis and detection evasion techniques, enabling its operators to remotely interact with a mobile device and harvest sensitive data. "Vultur has also started masquerading more of its malicious activity by encrypting its C2 communication, using multiple encrypted payloads that are decrypted
Kategorie: Hacking & Security

Vultur Android Banking Trojan Returns with Upgraded Remote Control Capabilities

1 Duben, 2024 - 08:04
The Android banking trojan known as Vultur has resurfaced with a suite of new features and improved anti-analysis and detection evasion techniques, enabling its operators to remotely interact with a mobile device and harvest sensitive data. "Vultur has also started masquerading more of its malicious activity by encrypting its C2 communication, using multiple encrypted payloads that are decryptedNewsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Hackers Target macOS Users with Malicious Ads Spreading Stealer Malware

30 Březen, 2024 - 09:16
Malicious ads and bogus websites are acting as a conduit to deliver two different stealer malware, including Atomic Stealer, targeting Apple macOS users. The ongoing infostealer attacks targeting macOS users may have adopted different methods to compromise victims' Macs, but operate with the end goal of stealing sensitive data, Jamf Threat Labs said in a report published Friday. One
Kategorie: Hacking & Security

Hackers Target macOS Users with Malicious Ads Spreading Stealer Malware

30 Březen, 2024 - 09:16
Malicious ads and bogus websites are acting as a conduit to deliver two different stealer malware, including Atomic Stealer, targeting Apple macOS users. The ongoing infostealer attacks targeting macOS users may have adopted different methods to compromise victims' Macs, but operate with the end goal of stealing sensitive data, Jamf Threat Labs said in a report published Friday. One Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Urgent: Secret Backdoor Found in XZ Utils Library, Impacts Major Linux Distros

30 Březen, 2024 - 07:23
Red Hat on Friday released an "urgent security alert" warning that two versions of a popular data compression library called XZ Utils (previously LZMA Utils) have been backdoored with malicious code designed to allow unauthorized remote access. The software supply chain compromise, tracked as CVE-2024-3094, has a CVSS score of 10.0, indicating maximum severity. It impacts XZ Utils
Kategorie: Hacking & Security

Urgent: Secret Backdoor Found in XZ Utils Library, Impacts Major Linux Distros

30 Březen, 2024 - 07:23
Red Hat on Friday released an "urgent security alert" warning that two versions of a popular data compression library called XZ Utils (previously LZMA Utils) have been backdoored with malicious code designed to allow unauthorized remote access. The software supply chain compromise, tracked as CVE-2024-3094, has a CVSS score of 10.0, indicating maximum severity. It impacts XZ UtilsNewsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

Dormakaba Locks Used in Millions of Hotel Rooms Could Be Cracked in Seconds

29 Březen, 2024 - 16:54
Security vulnerabilities discovered in Dormakaba's Saflok electronic RFID locks used in hotels could be weaponized by threat actors to forge keycards and stealthily slip into locked rooms. The shortcomings have been collectively named Unsaflok by researchers Lennert Wouters, Ian Carroll, rqu, BusesCanFly, Sam Curry, sshell, and Will Caruana. They were reported to the Zurich-based
Kategorie: Hacking & Security

Dormakaba Locks Used in Millions of Hotel Rooms Could Be Cracked in Seconds

29 Březen, 2024 - 16:54
Security vulnerabilities discovered in Dormakaba's Saflok electronic RFID locks used in hotels could be weaponized by threat actors to forge keycards and stealthily slip into locked rooms. The shortcomings have been collectively named Unsaflok by researchers Lennert Wouters, Ian Carroll, rqu, BusesCanFly, Sam Curry, sshell, and Will Caruana. They were reported to the Zurich-based Newsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

TheMoon Botnet Resurfaces, Exploiting EoL Devices to Power Criminal Proxy

29 Březen, 2024 - 14:12
A botnet previously considered to be rendered inert has been observed enslaving end-of-life (EoL) small home/small office (SOHO) routers and IoT devices to fuel a criminal proxy service called Faceless. "TheMoon, which emerged in 2014, has been operating quietly while growing to over 40,000 bots from 88 countries in January and February of 2024," the Black Lotus Labs team at Lumen
Kategorie: Hacking & Security

TheMoon Botnet Resurfaces, Exploiting EoL Devices to Power Criminal Proxy

29 Březen, 2024 - 14:12
A botnet previously considered to be rendered inert has been observed enslaving end-of-life (EoL) small home/small office (SOHO) routers and IoT devices to fuel a criminal proxy service called Faceless. "TheMoon, which emerged in 2014, has been operating quietly while growing to over 40,000 bots from 88 countries in January and February of 2024," the Black Lotus Labs team at LumenNewsroomhttp://www.blogger.com/profile/[email protected]
Kategorie: Hacking & Security

The Golden Age of Automated Penetration Testing is Here

29 Březen, 2024 - 13:19
Network penetration testing plays a vital role in detecting vulnerabilities that can be exploited. The current method of performing pen testing is pricey, leading many companies to undertake it only when necessary, usually once a year for their compliance requirements. This manual approach often misses opportunities to find and fix security issues early on, leaving businesses vulnerable to
Kategorie: Hacking & Security