Researchers have discovered a new offensive hacking framework called Manjusaka, which they call the "Chinese sibling of Sliver and Cobalt Strike."
Read: https://thehackernews.com/2022/08/chinese-hackers-using-new-manjusaka.html
Read: https://thehackernews.com/2022/08/chinese-hackers-using-new-manjusaka.html
VMware releases security patches to address 10 new vulnerabilities affecting multiple products that could be abused by unauthenticated attackers to perform malicious actions.
Read: https://thehackernews.com/2022/08/vmware-releases-patches-for-several-new.html
Read: https://thehackernews.com/2022/08/vmware-releases-patches-for-several-new.html
👍5
Researchers warn of a new, large-scale phishing campaign in which hackers have been observed using AitM techniques to get around security protections and compromise enterprise email accounts.
Read details: https://thehackernews.com/2022/08/researchers-warns-of-large-scale-aitm.html
Read details: https://thehackernews.com/2022/08/researchers-warns-of-large-scale-aitm.html
👍1
VirusTotal reveals the list of the most commonly impersonated software in malware attacks.
Read details: https://thehackernews.com/2022/08/virustotal-reveals-most-impersonated.html
Read details: https://thehackernews.com/2022/08/virustotal-reveals-most-impersonated.html
It took researchers about 62 minutes to crack a late-stage Post-Quantum encryption candidate algorithm using a single-core CPU.
Read details: https://thehackernews.com/2022/08/single-core-cpu-cracked-post-quantum.html
Read details: https://thehackernews.com/2022/08/single-core-cpu-cracked-post-quantum.html
Cisco rolls out security patches to address new vulnerabilities affecting small business routers, the most critical of which could allow attackers to execute malicious code.
Read details: https://thehackernews.com/2022/08/cisco-business-routers-found-vulnerable.html
Read details: https://thehackernews.com/2022/08/cisco-business-routers-found-vulnerable.html
🔥4👍2
Hackers "likely" exploited a vulnerability in Atlassian Confluence server to deploy a never-before-seen backdoor for espionage purposes against a research and technical services organization.
Read details: https://thehackernews.com/2022/08/hackers-exploited-atlassian-confluence.html
Read details: https://thehackernews.com/2022/08/hackers-exploited-atlassian-confluence.html
👍1
Hackers have been targeting Russian entities for at least a year with the newly discovered remote access trojan Woody RAT.
Read details: https://thehackernews.com/2022/08/new-woody-rat-malware-being-used-to.html
Read details: https://thehackernews.com/2022/08/new-woody-rat-malware-being-used-to.html
Researchers discovered a critical unauthenticated RCE vulnerability (CVE-2022-32548) affecting 29 different router models from DrayTek that can be exploited to gain full access over targeted networks.
Read details: https://thehackernews.com/2022/08/critical-rce-bug-could-let-hackers.html
Read details: https://thehackernews.com/2022/08/critical-rce-bug-could-let-hackers.html
U.S. cybersecurity agency CISA has added a recently disclosed, high-severity vulnerability in the Zimbra email suite to its "Known Exploited Vulnerabilities Catalog," citing evidence of active exploitation.
Read details: https://thehackernews.com/2022/08/cisa-adds-zimbra-email-vulnerability-to.html
Read details: https://thehackernews.com/2022/08/cisa-adds-zimbra-email-vulnerability-to.html
👍5
An increasing number of malware attacks are leveraging a nascent command-and-control service called "Dark Utilities," which allows hackers to remotely control compromised systems.
Read details: https://thehackernews.com/2022/08/a-growing-number-of-malware-attacks.html
Read details: https://thehackernews.com/2022/08/a-growing-number-of-malware-attacks.html
👍1
The U.S. Department of Homeland Security (DHS) has warned of critical security vulnerabilities in Emergency Alert System (EAS) encoder/decoder devices that could enable attackers to send fake messages.
Read details: https://thehackernews.com/2022/08/emergency-alert-system-flaws-could-let.html
Read details: https://thehackernews.com/2022/08/emergency-alert-system-flaws-could-let.html
👍4
Slack has reset passwords for some of its users after discovering a vulnerability in its workspace invitation system that exposed their salted password hashes.
Read details: https://thehackernews.com/2022/08/slack-resets-passwords-after-bug.html
Read details: https://thehackernews.com/2022/08/slack-resets-passwords-after-bug.html
👍2
Twitter reveals that hackers exploited a new zero-day vulnerability to expose 5.4 million user accounts by linking emails and phone numbers to them.
Read details: https://thehackernews.com/2022/08/hackers-exploit-twitter-vulnerability.html
Read details: https://thehackernews.com/2022/08/hackers-exploit-twitter-vulnerability.html
👍2
Researchers discover new IoT RapperBot malware capable of brute-forcing SSH credentials to compromise Linux servers.
Read details: https://thehackernews.com/2022/08/new-iot-rapperbot-malware-targeting.html
Read details: https://thehackernews.com/2022/08/new-iot-rapperbot-malware-targeting.html
Meta said it took action against two espionage operations in South Asia that used the Facebook platform to spread malware to potential targets.
Read details: https://thehackernews.com/2022/08/meta-cracks-down-on-cyber-espionage.html
Read details: https://thehackernews.com/2022/08/meta-cracks-down-on-cyber-espionage.html
👍2
A sophisticated scam-as-a-service scheme known as "Classiscam" is now targeting Singapore.
Read details: https://t.co/OIhdnnMgTh
Read details: https://t.co/OIhdnnMgTh
👍3
A new botnet named Orchard has been observed using Bitcoin creator Satoshi Nakamoto's account transaction information to generate domain names to conceal its command-and-control (C2) infrastructure.
Details: https://t.co/hZ3swtxAX3
Details: https://t.co/hZ3swtxAX3
👍2
Researchers have discovered 10 new malicious Python packages distributed via the Python Package Index (PyPI) to harvest critical data points, such as users' passwords and API tokens.
Read details: https://thehackernews.com/2022/08/10-credential-stealing-python-libraries.html
Read details: https://thehackernews.com/2022/08/10-credential-stealing-python-libraries.html
👍3
Researchers have detected a wave of targeted cyberattacks on military-industrial complex enterprises and public institutions in several Eastern European countries and Afghanistan.
Read details: https://thehackernews.com/2022/08/chinese-hackers-targeted-dozens-of.html
Read details: https://thehackernews.com/2022/08/chinese-hackers-targeted-dozens-of.html
The U.S. Treasury sanctions virtual currency mixer Tornado Cash, citing its involvement with North Korea's Lazarus Group's high-profile hacking of Ethereum bridges to launder and cash out ill-gotten gains.
Details: https://thehackernews.com/2022/08/us-sanctions-virtual-currency-mixer.html
Details: https://thehackernews.com/2022/08/us-sanctions-virtual-currency-mixer.html
👍1