The Hacker News

Syndikovat obsah
The Hacker News has been internationally recognized as a leading news source dedicated to promoting awareness for security experts and hackersUnknownnoreply@blogger.comBlogger12345125
Aktualizace: 37 min 18 sek zpět

How Multi-Stage Phishing Attacks Exploit QRs, CAPTCHAs, and Steganography

21 Listopad, 2023 - 11:40
Phishing attacks are steadily becoming more sophisticated, with cybercriminals investing in new ways of deceiving victims into revealing sensitive information or installing malicious software. One of the latest trends in phishing is the use of QR codes, CAPTCHAs, and steganography. See how they are carried out and learn to detect them. Quishing Quishing, a phishing technique resulting from the
Kategorie: Hacking & Security

How Multi-Stage Phishing Attacks Exploit QRs, CAPTCHAs, and Steganography

21 Listopad, 2023 - 11:40
Phishing attacks are steadily becoming more sophisticated, with cybercriminals investing in new ways of deceiving victims into revealing sensitive information or installing malicious software. One of the latest trends in phishing is the use of QR codes, CAPTCHAs, and steganography. See how they are carried out and learn to detect them. Quishing Quishing, a phishing technique resulting from the The Hacker Newshttp://www.blogger.com/profile/16801458706306167627noreply@blogger.comCybercrime / Malware Analysis37.09024 -95.7128918.780006163821156 -130.869141 65.400473836178847 -60.556641
Kategorie: Hacking & Security

Kinsing Hackers Exploit Apache ActiveMQ Vulnerability to Deploy Linux Rootkits

21 Listopad, 2023 - 11:00
The Kinsing threat actors are actively exploiting a critical security flaw in vulnerable Apache ActiveMQ servers to infect Linux systems with cryptocurrency miners and rootkits. "Once Kinsing infects a system, it deploys a cryptocurrency mining script that exploits the host's resources to mine cryptocurrencies like Bitcoin, resulting in significant damage to the infrastructure and a
Kategorie: Hacking & Security

Kinsing Hackers Exploit Apache ActiveMQ Vulnerability to Deploy Linux Rootkits

21 Listopad, 2023 - 11:00
The Kinsing threat actors are actively exploiting a critical security flaw in vulnerable Apache ActiveMQ servers to infect Linux systems with cryptocurrency miners and rootkits. "Once Kinsing infects a system, it deploys a cryptocurrency mining script that exploits the host's resources to mine cryptocurrencies like Bitcoin, resulting in significant damage to the infrastructure and a negative Newsroomhttp://www.blogger.com/profile/09767675513435997467noreply@blogger.comLinux / Rootkit37.09024 -95.7128918.780006163821156 -130.869141 65.400473836178847 -60.556641
Kategorie: Hacking & Security

Malicious Apps Disguised as Banks and Government Agencies Targeting Indian Android Users

21 Listopad, 2023 - 08:46
Android smartphone users in India are the target of a new malware campaign that employs social engineering lures to install fraudulent apps that are capable of harvesting sensitive data. “Using social media platforms like WhatsApp and Telegram, attackers are sending messages designed to lure users into installing a malicious app on their mobile device by impersonating legitimate organizations,
Kategorie: Hacking & Security

Malicious Apps Disguised as Banks and Government Agencies Targeting Indian Android Users

21 Listopad, 2023 - 08:46
Android smartphone users in India are the target of a new malware campaign that employs social engineering lures to install fraudulent apps that are capable of harvesting sensitive data. “Using social media platforms like WhatsApp and Telegram, attackers are sending messages designed to lure users into installing a malicious app on their mobile device by impersonating legitimate organizations, Newsroomhttp://www.blogger.com/profile/09767675513435997467noreply@blogger.comAndroid Security / Cryptocurrency37.09024 -95.7128918.780006163821156 -130.869141 65.400473836178847 -60.556641
Kategorie: Hacking & Security

Mustang Panda Hackers Targets Philippines Government Amid South China Sea Tensions

21 Listopad, 2023 - 07:58
The China-linked Mustang Panda actor has been linked to a cyber attack targeting a Philippines government entity amid rising tensions between the two countries over the disputed South China Sea. Palo Alto Networks Unit 42 attributed the adversarial collective to three campaigns in August 2023, primarily singling out organizations in the South Pacific. "The campaigns leveraged
Kategorie: Hacking & Security

Mustang Panda Hackers Targets Philippines Government Amid South China Sea Tensions

21 Listopad, 2023 - 07:58
The China-linked Mustang Panda actor has been linked to a cyber attack targeting a Philippines government entity amid rising tensions between the two countries over the disputed South China Sea. Palo Alto Networks Unit 42 attributed the adversarial collective to three campaigns in August 2023, primarily singling out organizations in the South Pacific. "The campaigns leveraged legitimate softwareNewsroomhttp://www.blogger.com/profile/09767675513435997467noreply@blogger.comCyber Attack / Cyber Espionage37.09024 -95.7128918.780006163821156 -130.869141 65.400473836178847 -60.556641
Kategorie: Hacking & Security

NetSupport RAT Infections on the Rise - Targeting Government and Business Sectors

20 Listopad, 2023 - 16:19
Threat actors are targeting the education, government and business services sectors with a remote access trojan called NetSupport RAT. "The delivery mechanisms for the NetSupport RAT encompass fraudulent updates, drive-by downloads, utilization of malware loaders (such as GHOSTPULSE), and various forms of phishing campaigns," VMware Carbon Black researchers said in a report shared with
Kategorie: Hacking & Security

NetSupport RAT Infections on the Rise - Targeting Government and Business Sectors

20 Listopad, 2023 - 16:19
Threat actors are targeting the education, government and business services sectors with a remote access trojan called NetSupport RAT. "The delivery mechanisms for the NetSupport RAT encompass fraudulent updates, drive-by downloads, utilization of malware loaders (such as GHOSTPULSE), and various forms of phishing campaigns," VMware Carbon Black researchers said in a report shared with The Newsroomhttp://www.blogger.com/profile/09767675513435997467noreply@blogger.comMalware / Network Security37.09024 -95.7128918.780006163821156 -130.869141 65.400473836178847 -60.556641
Kategorie: Hacking & Security

DarkGate and PikaBot Malware Resurrect QakBot's Tactics in New Phishing Attacks

20 Listopad, 2023 - 15:50
Phishing campaigns delivering malware families such as DarkGate and PikaBot are following the same tactics previously used in attacks leveraging the now-defunct QakBot trojan. “These include hijacked email threads as the initial infection, URLs with unique patterns that limit user access, and an infection chain nearly identical to what we have seen with QakBot delivery,” Cofense said 
Kategorie: Hacking & Security

Product Walkthrough: Silverfort's Unified Identity Protection Platform

20 Listopad, 2023 - 15:50
In this article, we will provide a brief overview of Silverfort's platform, the first (and currently only) unified identity protection platform on the market. Silverfort’s patented technology aims to protect organizations from identity-based attacks by integrating with existing identity and access management solutions, such as AD (Active Directory) and cloud-based services, and extending secure
Kategorie: Hacking & Security

DarkGate and PikaBot Malware Resurrect QakBot's Tactics in New Phishing Attacks

20 Listopad, 2023 - 15:50
Phishing campaigns delivering malware families such as DarkGate and PikaBot are following the same tactics previously used in attacks leveraging the now-defunct QakBot trojan. “These include hijacked email threads as the initial infection, URLs with unique patterns that limit user access, and an infection chain nearly identical to what we have seen with QakBot delivery,” Cofense said in a reportNewsroomhttp://www.blogger.com/profile/09767675513435997467noreply@blogger.comThreat Analysis / Malware37.09024 -95.7128918.780006163821156 -130.869141 65.400473836178847 -60.556641
Kategorie: Hacking & Security

Product Walkthrough: Silverfort's Unified Identity Protection Platform

20 Listopad, 2023 - 15:50
In this article, we will provide a brief overview of Silverfort's platform, the first (and currently only) unified identity protection platform on the market. Silverfort’s patented technology aims to protect organizations from identity-based attacks by integrating with existing identity and access management solutions, such as AD (Active Directory) and cloud-based services, and extending secure The Hacker Newshttp://www.blogger.com/profile/16801458706306167627noreply@blogger.comIdentity Protection / Enterprise Security37.09024 -95.7128918.780006163821156 -130.869141 65.400473836178847 -60.556641
Kategorie: Hacking & Security

Why Defenders Should Embrace a Hacker Mindset

20 Listopad, 2023 - 12:02
Today’s security leaders must manage a constantly evolving attack surface and a dynamic threat environment due to interconnected devices, cloud services, IoT technologies, and hybrid work environments. Adversaries are constantly introducing new attack techniques, and not all companies have internal Red Teams or unlimited security resources to stay on top of the latest threats. On top of that,
Kategorie: Hacking & Security

Why Defenders Should Embrace a Hacker Mindset

20 Listopad, 2023 - 12:02
Today’s security leaders must manage a constantly evolving attack surface and a dynamic threat environment due to interconnected devices, cloud services, IoT technologies, and hybrid work environments. Adversaries are constantly introducing new attack techniques, and not all companies have internal Red Teams or unlimited security resources to stay on top of the latest threats. On top of that, The Hacker Newshttp://www.blogger.com/profile/16801458706306167627noreply@blogger.comThreat Management / Red Team37.09024 -95.7128918.780006163821156 -130.869141 65.400473836178847 -60.556641
Kategorie: Hacking & Security

LummaC2 Malware Deploys New Trigonometry-Based Anti-Sandbox Technique

20 Listopad, 2023 - 11:49
The stealer malware known as LummaC2 (aka Lumma Stealer) now features a new anti-sandbox technique that leverages the mathematical principle of trigonometry to evade detection and exfiltrate valuable information from infected hosts. The method is designed to "delay detonation of the sample until human mouse activity is detected," Outpost24 security researcher Alberto Marín said in a technical Newsroomhttp://www.blogger.com/profile/09767675513435997467noreply@blogger.comMalware / Cyber Attack37.09024 -95.7128918.780006163821156 -130.869141 65.400473836178847 -60.556641
Kategorie: Hacking & Security

Randstorm Exploit: Bitcoin Wallets Created b/w 2011-2015 Vulnerable to Hacking

20 Listopad, 2023 - 10:16
Bitcoin wallets created between 2011 and 2015 are susceptible to a new kind of exploit called Randstorm that makes it possible to recover passwords and gain unauthorized access to a multitude of wallets spanning several blockchain platforms. "Randstorm() is a term we coined to describe a collection of bugs, design decisions, and API changes that, when brought in contact with each other, combine Newsroomhttp://www.blogger.com/profile/09767675513435997467noreply@blogger.comCryptocurrency / Blockchain37.09024 -95.7128918.780006163821156 -130.869141 65.400473836178847 -60.556641
Kategorie: Hacking & Security

Indian Hack-for-Hire Group Targeted U.S., China, and More for Over 10 Years

20 Listopad, 2023 - 07:42
An Indian hack-for-hire group targeted the U.S., China, Myanmar, Pakistan, Kuwait, and other countries as part of a wide-ranging espionage, surveillance, and disruptive operation for over a decade. The Appin Software Security (aka Appin Security Group), according to an in-depth analysis from SentinelOne, began as an educational startup offering offensive security training programs, while Newsroomhttp://www.blogger.com/profile/09767675513435997467noreply@blogger.comCyber Espionage / Malware37.09024 -95.7128918.780006163821156 -130.869141 65.400473836178847 -60.556641
Kategorie: Hacking & Security

8Base Group Deploying New Phobos Ransomware Variant via SmokeLoader

18 Listopad, 2023 - 12:27
The threat actors behind the 8Base ransomware are leveraging a variant of the Phobos ransomware to conduct their financially motivated attacks. The findings come from Cisco Talos, which has recorded an increase in activity carried out by the cybercriminals. “Most of the group’s Phobos variants are distributed by SmokeLoader, a backdoor trojan," security researcher Guilherme Venere said in an Newsroomhttp://www.blogger.com/profile/09767675513435997467noreply@blogger.comRansomware / Endpoint Security37.09024 -95.7128918.780006163821156 -130.869141 65.400473836178847 -60.556641
Kategorie: Hacking & Security