What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
The_Hackers_News.webp 2022-03-15 06:03:58 Nearly 34 Ransomware Variants Observed in Hundreds of Cyberattacks in Q4 2021 (lien direct) As many as 722 ransomware attacks were observed during the fourth quarter of 2021, with LockBit 2.0, Conti, PYSA, Hive, and Grief emerging as the most prevalent strains, according to new research published by Intel 471. The attacks mark an increase of 110 and 129 attacks from the third and second quarters of 2021, respectively. In all, 34 different ransomware variants were detected during the Ransomware
The_Hackers_News.webp 2022-03-15 02:38:46 CaddyWiper: Yet Another Data Wiping Malware Targeting Ukrainian Networks (lien direct) Two weeks after details emerged about a second data wiper strain delivered in attacks against Ukraine, yet another destructive malware has been detected amid Russia's continuing military invasion of the country. Slovak cybersecurity company ESET dubbed the third wiper "CaddyWiper," which it said it first observed on March 14 around 9:38 a.m. UTC. Metadata associated with the executable (" Malware
The_Hackers_News.webp 2022-03-15 00:26:56 Massive DDoS Attack Knocked Israeli Government Websites Offline (lien direct) A number of websites belonging to the Israeli government were felled in a distributed denial-of-service (DDoS) attack on Monday, rendering the portals inaccessible for a short period of time. "In the past few hours, a DDoS attack against a communications provider was identified," the Israel National Cyber Directorate (INCD) said in a tweet. "As a result, access to several websites, among them
The_Hackers_News.webp 2022-03-14 20:44:11 \'Dirty Pipe\' Linux Flaw Affects a Wide Range of QNAP NAS Devices (lien direct) Network-attached storage (NAS) appliance maker QNAP on Monday warned of a recently disclosed Linux vulnerability affecting its devices that could be abused to elevate privileges and gain control of affected systems. "A local privilege escalation vulnerability, also known as 'Dirty Pipe,' has been reported to affect the Linux kernel on QNAP NAS running QTS 5.0.x and QuTS hero h5.0.x," the company Vulnerability
The_Hackers_News.webp 2022-03-14 06:26:26 Gaming Company Ubisoft Confirms It was Hacked, Resets Staff Passwords (lien direct) French video game company Ubisoft on Friday confirmed it was a victim of a "cyber security incident," causing temporary disruptions to its games, systems, and services. The Montreuil-headquartered firm said that an investigation into the breach was underway and that it has initiated a company-wide password reset as a precautionary measure. "Also, we can confirm that all our games and services
The_Hackers_News.webp 2022-03-14 06:19:43 Why Enterprise Threat Mitigation Requires Automated, Single-Purpose Tools (lien direct) As much as threat mitigation is to a degree a specialist task involving cybersecurity experts, the day to day of threat mitigation often still comes down to systems administrators. For these sysadmins it's not an easy task, however. In enterprise IT, sysadmins teams have a wide remit but limited resources. For systems administrators finding the time and resources to mitigate against a growing Threat
The_Hackers_News.webp 2022-03-14 05:48:01 Russian Ransomware Gang Retool Custom Hacking Tools of Other APT Groups (lien direct) A Russian-speaking ransomware outfit likely targeted an unnamed entity in the gambling and gaming sector in Europe and Central America by repurposing custom tools developed by other APT groups like Iran's MuddyWater, new research has found. The unusual attack chain involved the abuse of stolen credentials to gain unauthorized access to the victim network, ultimately leading to the deployment of Ransomware Guideline
The_Hackers_News.webp 2022-03-14 04:05:29 New Linux Bug in Netfilter Firewall Module Lets Attackers Gain Root Access (lien direct) A newly disclosed security flaw in the Linux kernel could be leveraged by a local adversary to gain elevated privileges on vulnerable systems to execute arbitrary code, escape containers, or induce a kernel panic. Tracked as CVE-2022-25636 (CVSS score: 7.8), the vulnerability impacts Linux kernel versions 5.4 through 5.6.10 and is a result of a heap out-of-bounds write in the netfilter Vulnerability
The_Hackers_News.webp 2022-03-14 02:17:59 Researchers Find New Evidence Linking Kwampirs Malware to Shamoon APT Hackers (lien direct) New findings released last week showcase the overlapping source code and techniques between the operators of Shamoon and Kwampirs, indicating that they "are the same group or really close collaborators." "Research evidence shows identification of co-evolution between both Shamoon and Kwampirs malware families during the known timeline," Pablo Rincón Crespo of Cylera Labs said. "If Kwampirs is Malware
The_Hackers_News.webp 2022-03-11 05:11:13 Multiple Security Flaws Discovered in Popular Software Package Managers (lien direct) Multiple security vulnerabilities have been disclosed in popular package managers that, if potentially exploited, could be abused to run arbitrary code and access sensitive information, including source code and access tokens, from compromised machines. It's, however, worth noting that the flaws require the targeted developers to handle a malicious package in conjunction with one of the affected
The_Hackers_News.webp 2022-03-11 02:06:47 Russian Pushing New State-run TLS Certificate Authority to Deal With Sanctions (lien direct) The Russian government has established its own TLS certificate authority (CA) to address issues with accessing websites that have arisen in the wake of sanctions imposed by the west following the country's unprovoked military invasion of Ukraine. According to a message posted on the Gosuslugi public services portal, the Ministry of Digital Development is expected to provide a domestic
The_Hackers_News.webp 2022-03-10 23:54:04 Here\'s How to Find If WhatsApp Web Code on Your Browser Has Been Hacked (lien direct) Meta Platforms' WhatsApp and Cloudflare have banded together for a new initiative called Code Verify to validate the authenticity of the messaging service's web app on desktop computers. Available in the form of a Chrome and Edge browser extension, the open-source add-on is designed to "automatically verif[y] the authenticity of the WhatsApp Web code being served to your browser," Facebook said 
The_Hackers_News.webp 2022-03-10 07:12:52 Iranian Hackers Targeting Turkey and Arabian Peninsula in New Malware Campaign (lien direct) The Iranian state-sponsored threat actor known as MuddyWater has been attributed to a new swarm of attacks targeting Turkey and the Arabian Peninsula with the goal of deploying remote access trojans (RATs) on compromised systems. "The MuddyWater supergroup is highly motivated and can use unauthorized access to conduct espionage, intellectual property theft, and deploy ransomware and destructive Ransomware Malware Threat
The_Hackers_News.webp 2022-03-10 06:29:37 New Exploit Bypasses Existing Spectre-v2 Mitigations in Intel, AMD, Arm CPUs (lien direct) Researchers have disclosed a new technique that could be used to circumvent existing hardware mitigations in modern processors from Intel, AMD, and Arm and stage speculative execution attacks such as Spectre to leak sensitive information from host memory. Attacks like Spectre are designed to break the isolation between different applications by taking advantage of an optimization technique 
The_Hackers_News.webp 2022-03-10 00:01:20 Ukrainian Hacker Linked to REvil Ransomware Attacks Extradited to United States (lien direct) Yaroslav Vasinskyi, a Ukrainian national, linked to the Russia-based REvil ransomware group has been extradited to the U.S. to face charges for his role in carrying out the file-encrypting malware attacks against several companies, including Kaseya last July. The 22-year-old had been previously arrested in Poland in October 2021, prompting the U.S. Justice Department (DoJ) to file charges of Ransomware Malware ★★
The_Hackers_News.webp 2022-03-09 23:36:53 Emotet Botnet\'s Latest Resurgence Spreads to Over 100,000 Computers (lien direct) The insidious Emotet botnet, which staged a return in November 2021 after a 10-month-long hiatus, is once again exhibiting signs of steady growth, amassing a swarm of over 100,000 infected hosts for perpetrating its malicious activities. "While Emotet has not yet attained the same scale it once had, the botnet is showing a strong resurgence with a total of approximately 130,000 unique bots
The_Hackers_News.webp 2022-03-09 05:26:18 Hackers Abuse Mitel Devices to Amplify DDoS Attacks by 4 Billion Times (lien direct) Threat actors have been observed abusing a high-impact reflection/amplification method to stage sustained distributed denial-of-service (DDoS) attacks for up to 14 hours with a record-breaking amplification ratio of 4,294,967,296 to 1. The attack vector – dubbed TP240PhoneHome (CVE-2022-26143) – has been weaponized to launch significant DDoS attacks targeting broadband access ISPs, financial
The_Hackers_News.webp 2022-03-09 03:48:34 Critical Bugs Could Let Attackers Remotely Hack, Damage APC Smart UPS Devices (lien direct) Three high-impact security vulnerabilities have been disclosed in APC Smart-UPS devices that could be abused by remote adversaries as a physical weapon to access and control them in an unauthorized manner. Collectively dubbed TLStorm, the flaws "allow for complete remote takeover of Smart-UPS devices and the ability to carry out extreme cyber-physical attacks," Ben Seri and Barak Hadad,
The_Hackers_News.webp 2022-03-09 02:04:37 Chinese APT41 Hackers Broke into at Least 6 U.S. State Governments: Mandiant (lien direct) APT41, the state-sponsored threat actor affiliated with China, breached at least six U.S. state government networks between May 2021 and February 2022 by retooling its attack vectors to take advantage of vulnerable internet-facing web applications. The exploited vulnerabilities included "a zero-day vulnerability in the USAHERDS application (CVE-2021-44207) as well as the now infamous zero-day in Vulnerability Threat Guideline APT 41
The_Hackers_News.webp 2022-03-09 01:48:57 Critical RCE Bugs Found in Pascom Cloud Phone System Used by Businesses (lien direct) Researchers have disclosed three security vulnerabilities affecting Pascom Cloud Phone System (CPS) that could be combined to achieve a full pre-authenticated remote code execution of affected systems. Kerbit security researcher Daniel Eshetu said the shortcomings, when chained together, can lead to "an unauthenticated attacker gaining root on these devices." Pascom Cloud Phone System is an Guideline
The_Hackers_News.webp 2022-03-08 21:44:56 Critical Security Patches Issued by Microsoft, Adobe and Other Major Software Firms (lien direct) Microsoft's Patch Tuesday update for the month of March has been made officially available with 71 fixes spanning across its software products such as Windows, Office, Exchange, and Defender, among others. Of the total 71 patches, three are rated Critical and 68 are rated Important in severity. While none of the vulnerabilities are listed as actively exploited, three of them are publicly known
The_Hackers_News.webp 2022-03-08 10:08:03 New 16 High-Severity UEFI Firmware Flaws Discovered in Millions of HP Devices (lien direct) Cybersecurity researchers on Tuesday disclosed 16 new high-severity vulnerabilities in various implementations of Unified Extensible Firmware Interface (UEFI) firmware impacting multiple HP enterprise devices. The shortcomings, which have CVSS scores ranging from 7.5 to 8.8, have been uncovered in HP's UEFI firmware. The variety of devices affected includes HP's laptops, desktops, point-of-sale
The_Hackers_News.webp 2022-03-08 06:10:46 Google: Russian Hackers Target Ukrainians, European Allies via Phishing Attacks (lien direct) A broad range of threat actors, including Fancy Bear, Ghostwriter, and Mustang Panda, have launched phishing campaigns against Ukraine, Poland, and other European entities amid Russia's invasion of Ukraine. Google's Threat Analysis Group (TAG) said it took down two Blogspot domains that were used by the nation-state group FancyBear (aka APT28) – which is attributed to Russia's GRU military Threat APT 28
The_Hackers_News.webp 2022-03-08 04:25:20 Google Buys Cybersecurity Firm Mandiant for $5.4 Billion (lien direct) Google is officially buying cybersecurity company Mandiant in an all-cash deal approximately valued at $5.4 billion, the two technology firms announced Tuesday. Mandiant is expected to be folded into Google Cloud upon the closure of the acquisition, which is slated to happen later this year, adding to the latter's growing portfolio of security offerings such as BeyondCorp Enterprise, VirusTotal,
The_Hackers_News.webp 2022-03-08 04:11:29 Samsung Confirms Data Breach After Hackers Leak Galaxy Source Code (lien direct) Samsung on Monday confirmed a security breach that resulted in the exposure of internal company data, including the source code related to its Galaxy smartphones. "According to our initial analysis, the breach involves some source code relating to the operation of Galaxy devices, but does not include the personal information of our consumers or employees," the electronics giant told Bloomberg. Data Breach
The_Hackers_News.webp 2022-03-08 02:23:14 Critical "Access:7" Supply Chain Vulnerabilities Impact ATMs, Medical and IoT Devices (lien direct) As many as seven security vulnerabilities have been disclosed in PTC's Axeda software that could be weaponized to gain unauthorized access to medical and IoT devices. Collectively called "Access:7," the weaknesses – three of which are rated Critical in severity – potentially affect more than 150 device models spanning over 100 different manufacturers, posing a significant supply chain risk.
The_Hackers_News.webp 2022-03-07 23:54:47 The Continuing Threat of Unpatched Security Vulnerabilities (lien direct) Unpatched software is a computer code containing known security weaknesses. Unpatched vulnerabilities refer to weaknesses that allow attackers to leverage a known security bug that has not been patched by running malicious code. Software vendors write additions to the codes, known as "patches," when they come to know about these application vulnerabilities to secure these weaknesses. Adversaries Threat
The_Hackers_News.webp 2022-03-07 23:43:22 Researchers Warn of Linux Kernel \'Dirty Pipe\' Arbitrary File Overwrite Vulnerability (lien direct) Linux distributions are in the process of issuing patches to address a newly disclosed security vulnerability in the kernel that could allow an attacker to overwrite arbitrary data into any read-only files and allow for a complete takeover of affected systems. Dubbed "Dirty Pipe" (CVE-2022-0847, CVSS score: 7.8) by IONOS software developer Max Kellermann, the flaw "leads to privilege escalation Vulnerability Guideline
The_Hackers_News.webp 2022-03-07 22:44:24 Microsoft Azure \'AutoWarp\' Bug Could Have Let Attackers Access Customers\' Accounts (lien direct) Details have been disclosed about a now-addressed critical vulnerability in Microsoft's Azure Automation service that could have permitted unauthorized access to other Azure customer accounts and take over control. "This attack could mean full control over resources and data belonging to the targeted account, depending on the permissions assigned by the customer," Orca Security researcher Yanir Vulnerability
The_Hackers_News.webp 2022-03-07 08:42:23 Critical Bugs in TerraMaster TOS Could Open NAS Devices to Remote Hacking (lien direct) Researchers have disclosed details of critical security vulnerabilities in TerraMaster network-attached storage (TNAS) devices that could be chained to attain unauthenticated remote code execution with the highest privileges. The issues reside in TOS, an abbreviation for TerraMaster Operating System, and "can grant unauthenticated attackers access to the victim's box simply by knowing the IP
The_Hackers_News.webp 2022-03-07 05:45:23 Understanding How Hackers Recon (lien direct) Cyber-attacks keep increasing and evolving but, regardless of the degree of complexity used by hackers to gain access, get a foothold, cloak their malware, execute their payload or exfiltrate data, their attack will begin with reconnaissance. They will do their utmost to uncover exposed assets and probe their target's attack surface for gaps that can be used as entry points. So, the first line
The_Hackers_News.webp 2022-03-07 05:23:51 Ukrainian CERT Warns Citizens of Phishing Attacks Using Compromised Accounts (lien direct) Ukraine's Computer Emergency Response Team (CERT-UA) warned of new phishing attacks aimed at its citizens by leveraging compromised email accounts belonging to three different Indian entities with the goal of compromising their inboxes and stealing sensitive information. The agency cautioned that the emails arrive with the subject line "Увага" (meaning "Attention") and claim to be from a
The_Hackers_News.webp 2022-03-06 23:36:25 SharkBot Banking Malware Spreading via Fake Android Antivirus App on Google Play Store (lien direct) The threat actor behind a nascent Android banking trojan named SharkBot has managed to evade Google Play Store security barriers by masquerading as an antivirus app. SharkBot, like its malware counterparts TeaBot, FluBot, and Oscorp (UBEL), belongs to a category of financial trojans capable of siphoning credentials to initiate money transfers from compromised devices by circumventing Malware Threat
The_Hackers_News.webp 2022-03-06 20:21:25 2 New Mozilla Firefox 0-Day Bugs Under Active Attack - Patch Your Browser ASAP! (lien direct) Mozilla has pushed out-of-band software updates to its Firefox web browser to contain two high-impact security vulnerabilities, both of which it says are being actively exploited in the wild. Tracked as CVE-2022-26485 and CVE-2022-26486, the zero-day flaws have been described as use-after-free issues impacting the Extensible Stylesheet Language Transformations (XSLT) parameter processing and the
The_Hackers_News.webp 2022-03-05 00:43:21 New Linux Kernel Cgroups Vulnerability Could Let Attackers Escape Container (lien direct) Details have emerged about a now-patched high-severity vulnerability in the Linux kernel that could potentially be abused to escape a container in order to execute arbitrary commands on the container host. The shortcoming resides in a Linux kernel feature called control groups, also referred to as cgroups version 1 (v1), which allows processes to be organized into hierarchical groups, Vulnerability
The_Hackers_News.webp 2022-03-04 23:53:47 Imperva Thwarts 2.5 Million RPS Ransom DDoS Extortion Attacks (lien direct) Cybersecurity company Imperva on Friday said it recently mitigated a ransom distributed denial-of-service (DDoS) attack targeting an unnamed website that peaked at 2.5 million requests per second (RPS). "While ransom DDoS attacks are not new, they appear to be evolving and becoming more interesting with time and with each new phase," Nelli Klepfish, security analyst at Imperva, said. "For
The_Hackers_News.webp 2022-03-04 23:32:51 CISA Adds Another 95 Flaws to its Actively Exploited Vulnerabilities Catalog (lien direct) The U.S. Cybersecurity and Infrastructure Security Agency (CISA) this week added 95 more security flaws to its Known Exploited Vulnerabilities Catalog, taking the total number of actively exploited vulnerabilities to 478. "These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise," the agency said in an advisory
The_Hackers_News.webp 2022-03-04 06:24:50 Both Sides in Russia-Ukraine War Heavily Using Telegram for Disinformation and Hacktivism (lien direct) Cyber criminals and hacktivist groups are increasingly using the Telegram messaging app for their activities, as the Russia-Ukraine conflict enters its eighth day. A new analysis by Israeli cybersecurity company Check Point Research has found that "user volume grew a hundred folds daily on Telegram related groups, peaking at 200,000 per group." Prominent among the groups are anti-Russian cyber
The_Hackers_News.webp 2022-03-03 22:31:31 New Security Vulnerability Affects Thousands of GitLab Instances (lien direct) Researchers have disclosed details of a now-patched security vulnerability in GitLab, an open-source DevOps software, that could potentially allow a remote, unauthenticated attacker to recover user-related information. Tracked as CVE-2021-4191 (CVSS score: 5.3), the medium-severity flaw affects all versions of GitLab Community Edition and Enterprise Edition starting from 13.0 and all versions Vulnerability
The_Hackers_News.webp 2022-03-03 22:06:40 Russia Releases List of IPs, Domains Attacking Its Infrastructure with DDoS Attacks (lien direct) As the ongoing Russia-Ukraine conflict continues to escalate, the Russian government on Thursday released a massive list containing 17,576 IP addresses and 166 domains that it said are behind a series of distributed denial-of-service (DDoS) attacks aimed at its domestic infrastructure. Some of the noticeable domains in the listing released by Russia's National Coordination Center for Computer
The_Hackers_News.webp 2022-03-03 05:54:21 Researchers Demonstrate New Side-Channel Attack on Homomorphic Encryption (lien direct) A group of academics from the North Carolina State University and Dokuz Eylul University have demonstrated what they say is the "first side-channel attack" on homomorphic encryption that could be exploited to leak data as the encryption process is underway. "Basically, by monitoring power consumption in a device that is encoding data for homomorphic encryption, we are able to read the data as it
The_Hackers_News.webp 2022-03-03 05:33:04 Critical Patches Issued for Cisco Expressway Series, TelePresence VCS Products (lien direct) Cisco this week shipped patches to address a new round of critical security vulnerabilities affecting Expressway Series and Cisco TelePresence Video Communication Server (VCS) that could be exploited by an attacker to gain elevated privileges and execute arbitrary code. The two flaws – tracked as CVE-2022-20754 and CVE-2022-20755 (CVSS scores: 9.0) – relate to an arbitrary file write and a
The_Hackers_News.webp 2022-03-03 05:17:42 How to Automate Offboarding to Keep Your Company Safe (lien direct) In the midst of 'The Great Resignation,' the damage from employees (or contractors) leaving an organization might be one of the greatest risks facing IT teams today. The reality is that in the busy enterprise computing environment, user onboarding and offboarding is a fact of daily life.  When employee counts range into the five-figure territory - and entire networks of contractors have to be
The_Hackers_News.webp 2022-03-03 02:21:52 Hackers Who Broke Into NVIDIA\'s Network Leak DLSS Source Code Online (lien direct) American chipmaking company NVIDIA on Tuesday confirmed that its network was breached as a result of a cyber attack, enabling the perpetrators to gain access to sensitive data, including source code purportedly associated with its Deep Learning Super Sampling (DLSS) technology. "We have no evidence of ransomware being deployed on the NVIDIA environment or that this is related to the Ransomware
The_Hackers_News.webp 2022-03-03 01:04:40 Report: Nearly 75% of Infusion Pumps Affected by Severe Vulnerabilities (lien direct) An analysis of data crowdsourced from more than 200,000 network-connected infusion pumps used in hospitals and healthcare entities has revealed that 75% of those medical devices contain security weaknesses that could put them at risk of potential exploitation. "These shortcomings included exposure to one or more of some 40 known cybersecurity vulnerabilities and/or alerts that they had one or
The_Hackers_News.webp 2022-03-03 00:37:32 U.S. Senate Passes Cybersecurity Bill to Strengthen Critical Infrastructure Security (lien direct) The U.S. Senate unanimously passed the "Strengthening American Cybersecurity Act" on Tuesday in an attempt to bolster the cybersecurity of critical infrastructure owners in the country. The new bipartisan legislation, among other things, stipulates entities that experience a cyber incident to report the attacks within 72 hours to the U.S. Cybersecurity and Infrastructure Security Agency (CISA),
The_Hackers_News.webp 2022-03-02 06:47:24 Hackers Try to Hack European Officials to Get Info on Ukrainian Refugees, Supplies (lien direct) Details of a new nation-state sponsored phishing campaign has been uncovered setting its sights on European governmental entities in what's seen as an attempt to obtain intelligence on refugee and supply movement in the region. Enterprise security company Proofpoint, which detected the malicious emails for the first time on February 24, 2022, dubbed the social engineering attacks "Asylum Hack
The_Hackers_News.webp 2022-03-02 02:38:44 Hackers Begin Weaponizing TCP Middlebox Reflection for Amplified DDoS Attacks (lien direct) Distributed denial-of-service (DDoS) attacks leveraging a new amplification technique called TCP Middlebox Reflection have been detected for the first time in the wild, six months after the novel attack mechanism was presented in theory. "The attack […] abuses vulnerable firewalls and content filtering systems to reflect and amplify TCP traffic to a victim machine, creating a powerful DDoS
The_Hackers_News.webp 2022-03-02 02:29:17 LIVE Webinar: Key Lessons Learned from Major Cyberattacks in 2021 and What to Expect in 2022 (lien direct) With the COVID-19 pandemic continuing to impact, and perhaps permanently changing, how we work, cybercriminals again leveraged the distraction in new waves of cyberattacks. Over the course of 2021 we saw an increase in multiple attack approaches; some old, some new. Phishing and ransomware continued to grow from previous years, as expected, while new attacks on supply chains and Ransomware
The_Hackers_News.webp 2022-03-01 23:10:38 Critical Bugs Reported in Popular Open Source PJSIP SIP and Media Stack (lien direct) As many as five security vulnerabilities have been disclosed in the PJSIP open-source multimedia communication library that could be abused by an attacker to trigger arbitrary code execution and denial-of-service (DoS) in applications that use the protocol stack. The weaknesses were identified and reported by JFrog's Security Research team, following which the project maintainers released
Last update at: 2024-07-19 20:08:15
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter