What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
The_Hackers_News.webp 2023-01-10 18:24:00 Italian Users Warned of Malware Attack Targeting Sensitive Information (lien direct) A new malware campaign has been observed targeting Italy with phishing emails designed to deploy an information stealer on compromised Windows systems. "The info-stealer malware steals sensitive information like system info, crypto wallet and browser histories, cookies, and credentials of crypto wallets from victim machines," Uptycs security researcher Karthickkumar Kathiresan said in a report. Malware ★★
The_Hackers_News.webp 2023-01-10 14:24:00 Critical Security Flaw Found in "jsonwebtoken" Library Used by 22,000+ Projects (lien direct) A high-severity security flaw has been disclosed in the open source jsonwebtoken (JWT) library that, if successfully exploited, could lead to remote code execution on a target server. "By exploiting this vulnerability, attackers could achieve remote code execution (RCE) on a server verifying a maliciously crafted JSON web token (JWT) request," Palo Alto Networks Unit 42 researcher Artur Oleyarsh Guideline ★★
The_Hackers_News.webp 2023-01-09 19:33:00 Kinsing Cryptojacking Hits Kubernetes Clusters via Misconfigured PostgreSQL (lien direct) The threat actors behind the Kinsing cryptojacking operation have been spotted exploiting misconfigured and exposed PostgreSQL servers to obtain initial access to Kubernetes environments. A second initial access vector technique entails the use of vulnerable images, Sunders Bruskin, security researcher at Microsoft Defender for Cloud, said in a report last week. Kinsing has a storied history of Threat Uber ★★★
The_Hackers_News.webp 2023-01-09 19:07:00 New Study Uncovers Text-to-SQL Model Vulnerabilities Allowing Data Theft and DoS Attacks (lien direct) A group of academics has demonstrated novel attacks that leverage Text-to-SQL models to produce malicious code that could enable adversaries to glean sensitive information and stage denial-of-service (DoS) attacks. "To better interact with users, a wide range of database applications employ AI techniques that can translate human questions into SQL queries (namely Text-to-SQL)," Xutan Peng, a ★★★
The_Hackers_News.webp 2023-01-09 18:27:00 Why Do User Permissions Matter for SaaS Security? (lien direct) Earlier this year, threat actors infiltrated Mailchimp, the popular SaaS email marketing platform. They viewed over 300 Mailchimp customer accounts and exported audience data from 102 of them. The breach was preceded by a successful phishing attempt and led to malicious attacks against Mailchimp's customers' end users. Three months later, Mailchimp was hit with another attack. Once again, an Threat ★★★
The_Hackers_News.webp 2023-01-09 16:00:00 Millions of Vehicles at Risk: API Vulnerabilities Uncovered in 16 Major Car Brands (lien direct) Multiple bugs affecting millions of vehicles from 16 different manufacturers could be abused to unlock, start, and track cars, plus impact the privacy of car owners. The security vulnerabilities were found in the automotive APIs powering Acura, BMW, Ferrari, Ford, Genesis, Honda, Hyundai, Infiniti, Jaguar, Kia, Land Rover, Mercedes-Benz, Nissan, Porsche, Rolls Royce, Toyota as well as in ★★
The_Hackers_News.webp 2023-01-09 14:17:00 Malicious PyPI Packages Using Cloudflare Tunnels to Sneak Through Firewalls (lien direct) In yet another campaign targeting the Python Package Index (PyPI) repository, six malicious packages have been found deploying information stealers on developer systems. The now-removed packages, which were discovered by Phylum between December 22 and December 31, 2022, include pyrologin, easytimestamp, discorder, discord-dev, style.py, and pythonstyles. The malicious code, as is increasingly ★★★
The_Hackers_News.webp 2023-01-09 13:26:00 Top SaaS Cybersecurity Threats in 2023: Are You Ready? (lien direct) Cybercriminals will be as busy as ever this year. Stay safe and protect your systems and data by focusing on these 4 key areas to secure your environment and ensure success in 2023, and make sure your business is only in the headlines when you WANT it to be. 1 - Web application weaknesses Web applications are at the core of what SaaS companies do and how they operate, and they can store some of ★★★
The_Hackers_News.webp 2023-01-09 12:51:00 Hackers Can Abuse Visual Studio Marketplace to Target Developers with Malicious Extensions (lien direct) A new attack vector targeting the Visual Studio Code extensions marketplace could be leveraged to upload rogue extensions masquerading as their legitimate counterparts with the goal of mounting supply chain attacks. The technique "could act as an entry point for an attack on many organizations," Aqua security researcher Ilay Goldman said in a report published last week. VS Code extensions, ★★★
The_Hackers_News.webp 2023-01-08 11:45:00 Russian Turla Hackers Hijack Decade-Old Malware Infrastructure to Deploy New Backdoors (lien direct) The Russian cyberespionage group known as Turla has been observed piggybacking on attack infrastructure used by a decade-old malware to deliver its own reconnaissance and backdoor tools to targets in Ukraine. Google-owned Mandiant, which is tracking the operation under the uncategorized cluster moniker UNC4210, said the hijacked servers correspond to a variant of a commodity malware called Malware ★★★★★
The_Hackers_News.webp 2023-01-06 23:12:00 Hackers Using CAPTCHA Bypass Tactics in Freejacking Campaign on GitHub (lien direct) A South Africa-based threat actor known as Automated Libra has been observed employing CAPTCHA bypass techniques to create GitHub accounts in a programmatic fashion as part of a freejacking campaign dubbed PURPLEURCHIN. The group "primarily targets cloud platforms offering limited-time trials of cloud resources in order to perform their crypto mining operations," Palo Alto Networks Unit 42 Threat ★★★
The_Hackers_News.webp 2023-01-06 19:45:00 Microsoft Reveals Tactics Used by 4 Ransomware Families Targeting macOS (lien direct) Microsoft has shed light on four different ransomware families – KeRanger, FileCoder, MacRansom, and EvilQuest – that are known to impact Apple macOS systems. "While these malware families are old, they exemplify the range of capabilities and malicious behavior possible on the platform," the tech giant's Security Threat Intelligence team said in a Thursday report. The initial vector for these Ransomware Malware Threat ★★★
The_Hackers_News.webp 2023-01-06 19:16:00 Dridex Malware Now Attacking macOS Systems with Novel Infection Method (lien direct) A variant of the infamous Dridex banking malware has set its sights on Apple's macOS operating system using a previously undocumented infection method, according to latest research. It has "adopted a new technique to deliver documents embedded with malicious macros to users without having to pretend to be invoices or other business-related files," Trend Micro researcher Armando Nathaniel Malware Prediction ★★★
The_Hackers_News.webp 2023-01-06 14:31:00 Rackspace Confirms Play Ransomware Gang Responsible for Recent Breach (lien direct) Cloud services provider Rackspace on Thursday confirmed that the ransomware gang known as Play was responsible for last month's breach. The security incident, which took place on December 2, 2022, leveraged a previously unknown security exploit to gain initial access to the Rackspace Hosted Exchange email environment. "This zero-day exploit is associated with CVE-2022-41080," the Texas-based Ransomware ★★
The_Hackers_News.webp 2023-01-06 14:00:00 WhatsApp Introduces Proxy Support to Help Users Bypass Internet Censorship (lien direct) Popular instant messaging service WhatsApp has launched support for proxy servers in the latest version of its Android and iOS apps, letting users circumvent government-imposed censorship and internet shutdowns. "Choosing a proxy enables you to connect to WhatsApp through servers set up by volunteers and organizations around the world dedicated to helping people communicate freely," the ★★
The_Hackers_News.webp 2023-01-05 20:25:00 Blind Eagle Hackers Return with Refined Tools and Sophisticated Infection Chain (lien direct) A financially motivated threat actor tracked as Blind Eagle has resurfaced with a refined toolset and an elaborate infection chain as part of its attacks targeting organizations in Colombia and Ecuador. Check Point's latest research offers new insights into the Spanish-speaking group's tactics and techniques, including the use of sophisticated tools and government-themed lures to activate the Threat APT-C-36 ★★★
The_Hackers_News.webp 2023-01-05 18:04:00 Bluebottle Cybercrime Group Preys on Financial Sector in French-Speaking African Nations (lien direct) A cybercrime group dubbed Bluebottle has been linked to a set of targeted attacks against the financial sector in Francophone countries located in Africa from at least July 2022 to September 2022. "The group makes extensive use of living-off-the-land, dual use tools, and commodity malware, with no custom malware deployed in this campaign," Symantec, a division of Broadcom Software, said in a Malware ★★
The_Hackers_News.webp 2023-01-05 16:35:00 SpyNote Strikes Again: Android Spyware Targeting Financial Institutions (lien direct) Financial institutions are being targeted by a new version of Android malware called SpyNote at least since October 2022. "The reason behind this increase is that the developer of the spyware, who was previously selling it to other actors, made the source code public," ThreatFabric said in a report shared with The Hacker News. "This has helped other actors [in] developing and distributing the Malware ★★
The_Hackers_News.webp 2023-01-05 16:21:00 Mitigate the LastPass Attack Surface in Your Environment with this Free Tool (lien direct) The latest breach announced by LastPass is a major cause for concern to security stakeholders. As often occurs, we are at a security limbo – on the one hand, as LastPass has noted, users who followed LastPass best practices would be exposed to practically zero to extremely low risk. However, to say that password best practices are not followed is a wild understatement. The reality is that there Tool LastPass ★★★
The_Hackers_News.webp 2023-01-05 14:42:00 CircleCI Urges Customers to Rotate Secrets Following Security Incident (lien direct) DevOps platform CircleCI on Wednesday urged its customers to rotate all their secrets following an unspecified security incident. The company said an investigation is currently ongoing, but emphasized that "there are no unauthorized actors active in our systems." Additional details are expected to be shared in the coming days. "Immediately rotate any and all secrets stored in CircleCI," ★★
The_Hackers_News.webp 2023-01-05 14:18:00 The Evolving Tactics of Vidar Stealer: From Phishing Emails to Social Media (lien direct) The notorious information-stealer known as Vidar is continuing to leverage popular social media services such as TikTok, Telegram, Steam, and Mastodon as an intermediate command-and-control (C2) server. "When a user creates an account on an online platform, a unique account page that can be accessed by anyone is generated," AhnLab Security Emergency Response Center (ASEC) disclosed in a ★★★
The_Hackers_News.webp 2023-01-05 13:22:00 Fortinet and Zoho Urge Customers to Patch Enterprise Software Vulnerabilities (lien direct) Fortinet has warned of a high-severity flaw affecting multiple versions of FortiADC application delivery controller that could lead to the execution of arbitrary code. "An improper neutralization of special elements used in an OS command vulnerability in FortiADC may allow an authenticated attacker with access to the web GUI to execute unauthorized code or commands via specifically crafted HTTP Vulnerability Guideline ★★★
The_Hackers_News.webp 2023-01-05 10:03:00 Irish Regulators Fine Facebook $414 Million for Forcing Users to Accept Targeted Ads (lien direct) The Irish Data Protection Commission (DPC) has fined Meta Platforms €390 million (roughly $414 million) over its handling of user data for serving personalized ads in what could be a major blow to its ad-fueled business model. To that end, the privacy regulator has ordered Meta Ireland to pay two fines – a €210 million ($222.5 million) fine over violations of the E.U. General Data Protection ★★★★
The_Hackers_News.webp 2023-01-04 16:17:00 Qualcomm Chipsets and Lenovo BIOS Get Security Updates to Fix Multiple Flaws (lien direct) Qualcomm on Tuesday released patches to address multiple security flaws in its chipsets, some of which could be exploited to cause information disclosure and memory corruption. The five vulnerabilities -- tracked from CVE-2022-40516 through CVE-2022-40520 -- also impact Lenovo ThinkPad X13s laptops, prompting the Chinese PC maker to issue BIOS updates to plug the security holes. The list of ★★★★
The_Hackers_News.webp 2023-01-04 15:54:00 The FBI\'s Perspective on Ransomware (lien direct) Ransomware: contemporary threats, how to prevent them and how the FBI can help In April 2021, Dutch supermarkets faced a food shortage. The cause wasn't a drought or a sudden surge in the demand for avocados. Rather, the reason was a ransomware attack. In the past years, companies, universities, schools, medical facilities and other organizations have been targeted by ransomware threat actors, Ransomware Threat Medical ★★★
The_Hackers_News.webp 2023-01-04 14:02:00 New shc-based Linux Malware Targeting Systems with Cryptocurrency Miner (lien direct) A new Linux malware developed using the shell script compiler (shc) has been observed deploying a cryptocurrency miner on compromised systems. "It is presumed that after successful authentication through a dictionary attack on inadequately managed Linux SSH servers, various malware were installed on the target system," AhnLab Security Emergency Response Center (ASEC) said in a report published Malware ★★
The_Hackers_News.webp 2023-01-04 09:58:00 Synology Releases Patch for Critical RCE Vulnerability Affecting VPN Plus Servers (lien direct) Synology has released security updates to address a critical flaw impacting VPN Plus Server that could be exploited to take over affected systems. Tracked as CVE-2022-43931, the vulnerability carries a maximum severity rating of 10 on the CVSS scale and has been described as an out-of-bounds write bug in the remote desktop functionality in Synology VPN Plus Server. Successful exploitation of the Vulnerability ★★★
The_Hackers_News.webp 2023-01-03 19:39:00 Enforcement vs. Enrollment-based Security: How to Balance Security and Employee Trust (lien direct) Challenges with an enforcement-based approach An enforcement-based approach to security begins with a security policy backed by security controls, often heavy-handed and designed to prevent employees from engaging in risky behavior or inadvertently expanding the potential attack surface of an organization.  Most organizations exclusively use enforcement-based security controls, usually carried ★★★
The_Hackers_News.webp 2023-01-03 17:02:00 Hackers Using Stolen Bank Information to Trick Victims into Downloading BitRAT Malware (lien direct) A new malware campaign has been observed using sensitive information stolen from a bank as a lure in phishing emails to drop a remote access trojan called BitRAT. The unknown adversary is believed to have hijacked the IT infrastructure of a Colombian cooperative bank, using the information to craft convincing decoy messages to lure victims into opening suspicious Excel attachments. The discovery Malware ★★★
The_Hackers_News.webp 2023-01-03 15:43:00 Raspberry Robin Worm Evolves to Attack Financial and Insurance Sectors in Europe (lien direct) Financial and insurance sectors in Europe have been targeted by the Raspberry Robin worm, as the malware continues to evolve its post-exploitation capabilities while remaining under the radar. "What is unique about the malware is that it is heavily obfuscated and highly complex to statically disassemble," Security Joes said in a new report published Monday. The intrusions, observed against Malware ★★★
The_Hackers_News.webp 2023-01-02 21:40:00 RedZei Chinese Scammers Targeting Chinese Students in the U.K. (lien direct) Chinese international students in the U.K. have been targeted by persistent Chinese-speaking scammers for over a year as part of an activity dubbed RedZei (aka RedThief). "The RedZei fraudsters have chosen their targets carefully, researched them and realized it was a rich victim group that is ripe for exploitation," cybersecurity researcher Will Thomas (@BushidoToken) said in a write-up ★★
The_Hackers_News.webp 2023-01-02 19:57:00 PyTorch Machine Learning Framework Compromised with Malicious Dependency (lien direct) The maintainers of the PyTorch package have warned users who have installed the nightly builds of the library between December 25, 2022, and December 30, 2022, to uninstall and download the latest versions following a dependency confusion attack. "PyTorch-nightly Linux packages installed via pip during that time installed a dependency, torchtriton, which was compromised on the Python Package ★★★
The_Hackers_News.webp 2023-01-02 13:20:00 WordPress Security Alert: New Linux Malware Exploiting Over Two Dozen CMS Flaws (lien direct) WordPress sites are being targeted by a previously unknown strain of Linux malware that exploits flaws in over two dozen plugins and themes to compromise vulnerable systems. "If sites use outdated versions of such add-ons, lacking crucial fixes, the targeted web pages are injected with malicious JavaScripts," Russian security vendor Doctor Web said in a report published last week. "As a result, Malware ★★★
The_Hackers_News.webp 2023-01-02 09:45:00 Google to Pay $29.5 Million to Settle Lawsuits Over User Location Tracking (lien direct) Google has agreed to pay a total of $29.5 million to settle two different lawsuits brought by Indiana and Washington, D.C., over its "deceptive" location tracking practices. The search and advertising giant is required to pay $9.5 million to D.C. and $20 million to Indiana after the states sued the company for charges that the company tracked users' locations without their express consent. The ★★★
The_Hackers_News.webp 2022-12-30 14:55:00 Researcher Uncovers Potential Wiretapping Bugs in Google Home Smart Speakers (lien direct) A security researcher was awarded a bug bounty of $107,500 for identifying security issues in Google Home smart speakers that could be exploited to install backdoors and turn them into wiretapping devices. The flaws "allowed an attacker within wireless proximity to install a 'backdoor' account on the device, enabling them to send commands to it remotely over the internet, access its microphone ★★★
The_Hackers_News.webp 2022-12-30 11:02:00 CISA Warns of Active exploitation of JasperReports Vulnerabilities (lien direct) The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two-years-old security flaws impacting TIBCO Software's JasperReports product to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The flaws, tracked as CVE-2018-5430 (CVSS score: 7.7) and CVE-2018-18809 (CVSS score: 9.9), were addressed by TIBCO in April 2018 and March 2019, ★★★
The_Hackers_News.webp 2022-12-29 15:13:00 Thousands of Citrix Servers Still Unpatched for Critical Vulnerabilities (lien direct) Thousands of Citrix Application Delivery Controller (ADC) and Gateway endpoints remain vulnerable to two critical security flaws disclosed by the company over the last few months. The issues in question are CVE-2022-27510 and CVE-2022-27518 (CVSS scores: 9.8), which were addressed by the virtualization services provider on November 8 and December 13, 2022, respectively. While CVE-2022-27510 ★★
The_Hackers_News.webp 2022-12-29 13:18:00 New Malvertising Campaign via Google Ads Targets Users Searching for Popular Software (lien direct) Users searching for popular software are being targeted by a new malvertising campaign that abuses Google Ads to serve trojanized variants that deploy malware, such as Raccoon Stealer and Vidar. The activity makes use of seemingly credible websites with typosquatted domain names that are surfaced on top of Google search results in the form of malicious ads by hijacking searches for specific ★★
The_Hackers_News.webp 2022-12-28 15:46:00 BitKeep Confirms Cyber Attack, Loses Over $9 Million in Digital Currencies (lien direct) Decentralized multi-chain crypto wallet BitKeep on Wednesday confirmed a cyberattack that allowed threat actors to distribute fraudulent versions of its Android app with the goal of stealing users' digital currencies. "With maliciously implanted code, the altered APK led to the leak of user's private keys and enabled the hacker to move funds," BitKeep CEO Kevin Como said, describing it as a " Threat ★★★
The_Hackers_News.webp 2022-12-28 12:42:00 APT Hackers Turn to Malicious Excel Add-ins as Initial Intrusion Vector (lien direct) Microsoft's decision to block Visual Basic for Applications (VBA) macros by default for Office files downloaded from the internet has led many threat actors to improvise their attack chains in recent months. Now according to Cisco Talos, advanced persistent threat (APT) actors and commodity malware families alike are increasingly using Excel add-in (.XLL) files as an initial intrusion vector. Malware Threat
The_Hackers_News.webp 2022-12-27 20:27:00 BlueNoroff APT Hackers Using New Ways to Bypass Windows MotW Protection (lien direct) BlueNoroff, a subcluster of the notorious Lazarus Group, has been observed adopting new techniques into its playbook that enable it to bypass Windows Mark of the Web (MotW) protections. This includes the use of optical disk image (.ISO extension) and virtual hard disk (.VHD extension) file formats as part of a novel infection chain, Kaspersky disclosed in a report published today. "BlueNoroff Medical APT 38 ★★★
The_Hackers_News.webp 2022-12-27 11:48:00 Facebook to Pay $725 Million to settle Lawsuit Over Cambridge Analytica Data Leak (lien direct) Meta Platforms, the parent company of Facebook, Instagram, and WhatsApp, has agreed to pay $725 million to settle a long-running class-action lawsuit filed in 2018. The legal dispute sprang up in response to revelations that the social media giant allowed third-party apps such as those, including Cambridge Analytica to access users' personal information without their consent for political ★★
The_Hackers_News.webp 2022-12-26 17:57:00 GuLoader Malware Utilizing New Techniques to Evade Security Software (lien direct) Cybersecurity researchers have exposed a wide variety of techniques adopted by an advanced malware downloader called GuLoader to evade security software. "New shellcode anti-analysis technique attempts to thwart researchers and hostile environments by scanning entire process memory for any virtual machine (VM)-related strings," CrowdStrike researchers Sarang Sonawane and Donato Onofri said in a Malware ★★★
The_Hackers_News.webp 2022-12-26 17:50:00 2022 Top Five Immediate Threats in Geopolitical Context (lien direct) As we are nearing the end of 2022, looking at the most concerning threats of this turbulent year in terms of testing numbers offers a threat-based perspective on what triggers cybersecurity teams to check how vulnerable they are to specific threats. These are the threats that were most tested to validate resilience with the Cymulate security posture management platform between January 1st and ★★★
The_Hackers_News.webp 2022-12-26 17:42:00 PrivateLoader PPI Service Found Distributing Info-Stealing RisePro Malware (lien direct) The pay-per-install (PPI) malware downloader service known as PrivateLoader is being used to distribute a previously documented information-stealing malware dubbed RisePro. Flashpoint spotted the newly identified stealer on December 13, 2022, after it discovered "several sets of logs" exfiltrated using the malware on an illicit cybercrime marketplace called Russian Market. A C++-based malware, Malware ★★
The_Hackers_News.webp 2022-12-24 18:21:00 W4SP Stealer Discovered in Multiple PyPI Packages Under Various Names (lien direct) Threat actors have published yet another round of malicious packages to Python Package Index (PyPI) with the goal of delivering information-stealing malware on compromised developer machines. Interestingly, while the malware goes by a variety of names like ANGEL Stealer, Celestial Stealer, Fade Stealer, Leaf $tealer, PURE Stealer, Satan Stealer, and @skid Stealer, cybersecurity company Phylum Malware Threat ★★★
The_Hackers_News.webp 2022-12-23 19:07:00 FrodoPIR: New Privacy-Focused Database Querying System (lien direct) The developers behind the Brave open-source web browser have revealed a new privacy-preserving data querying and retrieval system called FrodoPIR. The idea, the company said, is to use the technology to build out a wide range of use cases such as safe browsing, checking passwords against breached databases, certificate revocation checks, and streaming, among others. The scheme is called FrodoPIR ★★★
The_Hackers_News.webp 2022-12-23 16:44:00 Researchers Warn of Kavach 2FA Phishing Attacks Targeting Indian Govt. Officials (lien direct) A new targeted phishing campaign has zoomed in on a two-factor authentication solution called Kavach that's used by Indian government officials. Cybersecurity firm Securonix dubbed the activity STEPPY#KAVACH, attributing it to a threat actor known as SideCopy based on tactical overlaps with prior attacks. ".LNK files are used to initiate code execution which eventually downloads and runs a Threat ★★
The_Hackers_News.webp 2022-12-23 16:30:00 Accelerate Your Incident Response (lien direct) Tis the season for security and IT teams to send out that company-wide email: “No, our CEO does NOT want you to buy gift cards.”  As much of the workforce signs off for the holidays, hackers are stepping up their game. We'll no doubt see an increase in activity as hackers continue to unleash e-commerce scams and holiday-themed phishing attacks. Hackers love to use these tactics to trick end ★★
The_Hackers_News.webp 2022-12-23 15:35:00 Vice Society Ransomware Attackers Adopt Robust Encryption Methods (lien direct) The Vice Society ransomware actors have switched to yet another custom ransomware payload in their recent attacks aimed at a variety of sectors. "This ransomware variant, dubbed 'PolyVice,' implements a robust encryption scheme, using NTRUEncrypt and ChaCha20-Poly1305 algorithms," SentinelOne researcher Antonio Cocomazzi said in an analysis. Vice Society, which is tracked by Microsoft under the Ransomware ★★★
Last update at: 2024-07-22 12:07:54
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter