A new LockBit ransomware operation has surfaced and this time, it's targeting Apple's macOS devices.
Read details: https://thehackernews.com/2023/04/lockbit-ransomware-now-targeting-apple.html
Read details: https://thehackernews.com/2023/04/lockbit-ransomware-now-targeting-apple.html
😁29🔥12🤯8👍7👏4
In a new twist to malware distribution, threat actors are using YouTube videos to distribute the Aurora information stealer via "highly evasive" in2al5d p3in4er loader.
Read on to learn more: https://thehackernews.com/2023/04/youtube-videos-distributing-aurora.html
Read on to learn more: https://thehackernews.com/2023/04/youtube-videos-distributing-aurora.html
🤯13⚡5👍2😁2
New malware strain, Goldoson, has been detected in over 60 Android apps with more than 100 million downloads from the Google Play Store.
Read details: https://thehackernews.com/2023/04/goldoson-android-malware-infects-over.html
Read details: https://thehackernews.com/2023/04/goldoson-android-malware-infects-over.html
👍21😱6⚡2🔥1🤔1
Iranian MuddyWater hacker group has been found using the legitimate SimpleHelp remote support software to maintain persistence on victim devices.
Read details: https://thehackernews.com/2023/04/iranian-hackers-using-simplehelp-remote.html
Read details: https://thehackernews.com/2023/04/iranian-hackers-using-simplehelp-remote.html
👍30😁6🔥5🤯4⚡3🤔2
Two critical flaws (CVE-2023-29199 / CVE-2023-30547) have been discovered in vm2 JavaScript library that could allow attackers to break out of sandbox protections, potentially leading to RCE attacks.
Read details: https://thehackernews.com/2023/04/critical-flaws-in-vm2-javascript.html
Read details: https://thehackernews.com/2023/04/critical-flaws-in-vm2-javascript.html
🔥29👍5😁4⚡3👏3
Iranian govt-linked hackers have been identified as responsible for cyberattacks on critical infrastructure in the United States — targeting energy companies, transit systems, as well as a major utility and gas companies.
Details: https://thehackernews.com/2023/04/iranian-government-backed-hackers.html
Details: https://thehackernews.com/2023/04/iranian-government-backed-hackers.html
👍20😁10🤯9🔥3😱3⚡2
U.K. and U.S. cybersecurity agencies have warned of Russian nation-state actors exploiting flaws affecting Cisco networking equipment to deploy malware and conduct reconnaissance.
Read details: https://thehackernews.com/2023/04/us-and-uk-warn-of-russian-hackers.html
Read details: https://thehackernews.com/2023/04/us-and-uk-warn-of-russian-hackers.html
🔥17👍6👏3🤯3🤔2😁1
🚨 Pakistan-based APT36 hackers are reportedly using a new Linux backdoor called Poseidon to target Indian government agencies, using a fake version of the govt-mandated 2FA software, Kavach, as a disguise.
Read details: https://thehackernews.com/2023/04/pakistani-hackers-use-linux-malware.html
Read details: https://thehackernews.com/2023/04/pakistani-hackers-use-linux-malware.html
👍24🤔13🔥10😁9😱4⚡2👏2
Google TAG identifies state-sponsored cyber actor FROZENLAKE (aka APT28, Fancy Bear, and more) conducting phishing campaigns to extract intelligence and influence public discourse related to the war in Ukraine.
Learn more: https://thehackernews.com/2023/04/google-tag-warns-of-russian-hackers.html
Learn more: https://thehackernews.com/2023/04/google-tag-warns-of-russian-hackers.html
👍25🤔8⚡4😁4🤯2
Israeli spyware maker NSO Group reportedly deployed at least 3 "zero-click" exploits against iPhones in 2022 to install Pegasus and spy on human rights defenders, journalists and others.
☠️ LATENTIMAGE
☠️ FINDMYPWN
☠️ PWNYOURHOME
Details: https://thehackernews.com/2023/04/nso-group-used-3-zero-click-iphone.html
☠️ LATENTIMAGE
☠️ FINDMYPWN
☠️ PWNYOURHOME
Details: https://thehackernews.com/2023/04/nso-group-used-3-zero-click-iphone.html
😁22😱21👍11⚡7🤔5🔥3👏2🤯2
China-linked hackers target African telecom service providers in a sophisticated campaign using previously unseen plugins from the MgBot malware framework.
Read details: https://thehackernews.com/2023/04/daggerfly-cyberattack-campaign-hits.html
Read details: https://thehackernews.com/2023/04/daggerfly-cyberattack-campaign-hits.html
👍18⚡11😁6👏5😱1
Alibaba Cloud's ApsaraDB RDS and AnalyticDB for PostgreSQL have been hit with critical vulnerabilities that could expose sensitive data belonging to other customers.
Learn more about the BrokenSesame flaws here: https://thehackernews.com/2023/04/two-critical-flaws-found-in-alibaba.html
Learn more about the BrokenSesame flaws here: https://thehackernews.com/2023/04/two-critical-flaws-found-in-alibaba.html
👏7👍4🔥4😱3😁2
Notorious Lazarus Group hackers strike again, this time leveraging fraudulent job offers to trick victims into downloading Linux malware.
Read details: https://thehackernews.com/2023/04/lazarus-group-adds-linux-malware-to.html
Read details: https://thehackernews.com/2023/04/lazarus-group-adds-linux-malware-to.html
🤯11🔥9👍8😁4😱2⚡1
Fortra sheds light on a zero-day remote code execution (RCE) vulnerability (CVE-2023-0669) in its GoAnywhere MFT tool, actively exploited by ransomware attackers.
Read details: https://thehackernews.com/2023/04/fortra-sheds-light-on-goanywhere-mft.html
Read details: https://thehackernews.com/2023/04/fortra-sheds-light-on-goanywhere-mft.html
🤯13👍8🔥4😁4⚡2
North Korean hackers demonstrate new levels of sophistication with the recent supply chain attack targeting 3CX. Researchers have revealed that it's the first time a software supply chain attack has led to another attack.
Read details: https://thehackernews.com/2023/04/nk-hackers-employ-matryoshka-doll-style.html
Read details: https://thehackernews.com/2023/04/nk-hackers-employ-matryoshka-doll-style.html
🔥17👍6😁5🤯5⚡4🤔1
🔥 Attention IT teams! Critical security flaws have been found in Cisco and VMware products that could allow attackers to execute arbitrary code on affected systems.
Details here: https://thehackernews.com/2023/04/cisco-and-vmware-release-security.html
Make sure to patch your systems immediately.
Details here: https://thehackernews.com/2023/04/cisco-and-vmware-release-security.html
Make sure to patch your systems immediately.
🔥25⚡10👍7😱7😁5🤯3🤔1
Researchers report GhostToken vulnerability in Google Cloud Platform, allowing threat actors to hide malicious apps in victim's Google account.
Read details: https://thehackernews.com/2023/04/ghosttoken-flaw-could-let-attackers.html
Read details: https://thehackernews.com/2023/04/ghosttoken-flaw-could-let-attackers.html
👍26😁6🔥2
Heads up, Kubernetes users! A large-scale attack campaign exploiting Kubernetes (K8s) Role-Based Access Control (RBAC) has been discovered, leading to backdoors and cryptocurrency miners.
Read details: https://thehackernews.com/2023/04/kubernetes-rbac-exploited-in-large.html
Read details: https://thehackernews.com/2023/04/kubernetes-rbac-exploited-in-large.html
👍24🤯7😁5😱5🔥3
U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds 3 vulnerabilities to its KEV catalog due to active exploitation!
Read details: https://thehackernews.com/2023/04/cisa-adds-3-actively-exploited-flaws-to.html
✅ CVE-2023-28432
✅ CVE-2023-27350
✅ CVE-2023-2136
Read details: https://thehackernews.com/2023/04/cisa-adds-3-actively-exploited-flaws-to.html
✅ CVE-2023-28432
✅ CVE-2023-27350
✅ CVE-2023-2136
👍20🤯10😁8⚡7🔥4
⚡ Lazarus group's compromise of X_TRADER app not only led to the 3CX supply chain attack but also impacted power and energy sectors & financial trading businesses.
Read details: https://thehackernews.com/2023/04/lazarus-xtrader-hack-impacts-critical.html
Read details: https://thehackernews.com/2023/04/lazarus-xtrader-hack-impacts-critical.html
👍32⚡6🔥6😁5🤔4
PaperCut, a print management software provider, has warned about ongoing exploitation of unpatched servers, potentially by Russian hackers, to gain persistent access and execute malicious code on infected hosts.
Read details: https://thehackernews.com/2023/04/russian-hackers-suspected-in-ongoing.html
Read details: https://thehackernews.com/2023/04/russian-hackers-suspected-in-ongoing.html
👍29😁8⚡4🤔1