A new malware campaign has been observed distributing three info-stealersβCryptBot, LummaC2, and Rhadamanthysβusing CDN cache domains to avoid detection.
Read: https://thehackernews.com/2024/04/coralraider-malware-campaign-exploits.html
Read: https://thehackernews.com/2024/04/coralraider-malware-campaign-exploits.html
π7π6π€―5
β οΈ Malware Alert: A sophisticated campaign called GuptiMiner is exploiting a vulnerability in eScan antivirus to distribute backdoors and crypto miners.
Read on to explore the potential state-sponsored ties: https://thehackernews.com/2024/04/escan-antivirus-update-mechanism.html
Read on to explore the potential state-sponsored ties: https://thehackernews.com/2024/04/escan-antivirus-update-mechanism.html
π9β‘4π4
β‘ Major security flaws uncovered in popular Chinese keyboard apps, which could expose users' private keystrokes.
Over 1 billion people using Baidu, Honor, iFlytek, OPPO, Samsung, Tencent, Vivo, and Xiaomi devices may be affected.
Details: https://thehackernews.com/2024/04/major-security-flaws-expose-keystrokes.html
Over 1 billion people using Baidu, Honor, iFlytek, OPPO, Samsung, Tencent, Vivo, and Xiaomi devices may be affected.
Details: https://thehackernews.com/2024/04/major-security-flaws-expose-keystrokes.html
π14π€―7π5π1
IT offboarding is my favorite task! Said no one, ever.
Automate 90% of IT manual offboarding tasks with Nudge Security. Discover ALL SaaS identities and automate steps to revoke access, including OAuth grants and non-SSO accounts.
Get started here: https://thn.news/automated-it-offboarding-software
Automate 90% of IT manual offboarding tasks with Nudge Security. Discover ALL SaaS identities and automate steps to revoke access, including OAuth grants and non-SSO accounts.
Get started here: https://thn.news/automated-it-offboarding-software
Nudgesecurity
2024 Employee Offboarding Software | Nudge Security
Nudge Security ensures that all access to your cloud and SaaS systems and data remains intact during employee turnover.
π14π₯8
π΅οΈββοΈ Heads up! Researchers have uncovered a sneaky attack delivering malware called SSLoad through phishing emails. This cunning malware infiltrates systems, steals sensitive data, and relays it back to the attackers.
Read: https://thehackernews.com/2024/04/researchers-detail-multistage-attack.html
Read: https://thehackernews.com/2024/04/researchers-detail-multistage-attack.html
π7π2
U.S. Treasury Department has sanctioned two Iranian firms and four individuals for their involvement in malicious cyber activities targeting U.S. companies and government entities on behalf of the IRGC-CEC.
More details. π https://thehackernews.com/2024/04/us-treasury-sanctions-iranian-firms-and.html
More details. π https://thehackernews.com/2024/04/us-treasury-sanctions-iranian-firms-and.html
π12π5
What to consider when evaluating tools to help activate & keep up with CTEM?π§
We got your answers right hereβ¬οΈ
Check out XM Cyber Buyerβs Guide to Meeting & Maintaining CTEM & start building consistent, actionable exposure remediation plans.
Dowload now: https://thn.news/ctem-buyers-guide
We got your answers right hereβ¬οΈ
Check out XM Cyber Buyerβs Guide to Meeting & Maintaining CTEM & start building consistent, actionable exposure remediation plans.
Dowload now: https://thn.news/ctem-buyers-guide
Xmcyber
CTEM Buyerβs guide
π10π₯2
UPDATE β Airbus CERT releases Python scripts to scan for the critical CrushFTP flaw (CVE-2024-4040) that allows remote code execution. The zero-day has been exploited in attacks against U.S. entities.
Check: https://thehackernews.com/2024/04/critical-update-crushftp-zero-day-flaw.html
#infosec
Check: https://thehackernews.com/2024/04/critical-update-crushftp-zero-day-flaw.html
#infosec
π20π€―6π2β‘1
New stealthy malware campaign exploits 2 ZERO-DAY flaws in Cisco devices, enabling covert data collection & reconnaissance by a state-sponsored actor.
Details: https://thehackernews.com/2024/04/state-sponsored-hackers-exploit-two.html
"Line Runner" and "Line Dancer" implants allow config changes and traffic capture.
Details: https://thehackernews.com/2024/04/state-sponsored-hackers-exploit-two.html
"Line Runner" and "Line Dancer" implants allow config changes and traffic capture.
π16π₯10β‘1
U.S. Department of Justice arrested two founders of cryptocurrency mixer Samourai, seizing the service, for allegedly enabling over $2 billion in illegal transactions and laundering more than $100 million in criminal proceeds.
Learn more: https://thehackernews.com/2024/04/doj-arrests-founders-of-crypto-mixer.html
Learn more: https://thehackernews.com/2024/04/doj-arrests-founders-of-crypto-mixer.html
π€―18π12π€8β‘1π1
The new #YARA search tool from AnyRun helps you quickly find relevant threats.
π Scan the service's public malware database using your own YARA rules to identify matching files. Explore the findings further in the sandbox.
Learn more β‘οΈ https://thehackernews.uk/yara-malware-search
π Scan the service's public malware database using your own YARA rules to identify matching files. Explore the findings further in the sandbox.
Learn more β‘οΈ https://thehackernews.uk/yara-malware-search
ANY.RUN's Cybersecurity Blog
Find Malware by File Contents with YARA Search
Explore the new YARA Search tool from ANY.RUN. Find relevant malware samples using your own YARA rules and study them in the sandbox.
π₯17π10π4β‘1
North Korean hackers used fake job offers to deliver a new Trojan called Kaolin RAT. It can change file timestamps and load malware - a gateway to the dangerous FudModule rootkit.
Details here: https://thehackernews.com/2024/04/north-koreas-lazarus-group-deploys-new.html
Details here: https://thehackernews.com/2024/04/north-koreas-lazarus-group-deploys-new.html
π€―24π11π₯8β‘1π1
π¨ Attention WordPress users!
A critical SQL injection vulnerability (CVE-2024-27956) in the WP-Automatic plugin is being actively exploited. With a max severity of 9.9/10, this bug enables site takeovers and malicious activities.
Details: https://thehackernews.com/2024/04/hackers-exploiting-wp-automatic-plugin.html
A critical SQL injection vulnerability (CVE-2024-27956) in the WP-Automatic plugin is being actively exploited. With a max severity of 9.9/10, this bug enables site takeovers and malicious activities.
Details: https://thehackernews.com/2024/04/hackers-exploiting-wp-automatic-plugin.html
π19π8π€―8π₯4β‘2
β οΈ Attention Android users!
A new malware called Brokewell is disguising itself as updates for popular apps like Google Chrome and Klarna. Don't fall for these fake updates.
Click to find out more: https://thehackernews.com/2024/04/new-brokewell-android-malware-spread.html
A new malware called Brokewell is disguising itself as updates for popular apps like Google Chrome and Klarna. Don't fall for these fake updates.
Click to find out more: https://thehackernews.com/2024/04/new-brokewell-android-malware-spread.html
π12π7β‘2π€2π±1
π Attention, Palo Alto Networks users!
A critical vulnerability (CVE-2024-3400) in PAN-OS could expose your systems to remote code execution attacks.
Good news: Hotfixes and remediation steps available.
Read full advisory: https://thehackernews.com/2024/04/palo-alto-networks-outlines-remediation.html
A critical vulnerability (CVE-2024-3400) in PAN-OS could expose your systems to remote code execution attacks.
Good news: Hotfixes and remediation steps available.
Read full advisory: https://thehackernews.com/2024/04/palo-alto-networks-outlines-remediation.html
π€―16π11π€3β‘1
π‘οΈ Did you know 70% of successful breaches begin at the endpoint? Unprotected devices are gateways for devastating cyberattacks.
This guide shares 10 must-know tips, from identifying vulnerabilities to implementing robust security solutions: https://thehackernews.com/2024/04/10-critical-endpoint-security-tips-you.html
This guide shares 10 must-know tips, from identifying vulnerabilities to implementing robust security solutions: https://thehackernews.com/2024/04/10-critical-endpoint-security-tips-you.html
π13π₯6β‘1
Multiple severe vulnerabilities discovered in Brocade SANnav SAN management application.
From insecure root access to lack of authentication and encryption, one flaw even allows unauthenticated remote attackers to log in as root!
Read: https://thehackernews.com/2024/04/severe-flaws-disclosed-in-brocade.html
From insecure root access to lack of authentication and encryption, one flaw even allows unauthenticated remote attackers to log in as root!
Read: https://thehackernews.com/2024/04/severe-flaws-disclosed-in-brocade.html
π18β‘1
π¨ Developers Beware! A new social engineering scam is on the rise, luring software engineers with fake job interviews only to infect their systems with BeaverTail and InvisibleFerret backdoors malware.
https://thehackernews.com/2024/04/bogus-npm-packages-used-to-trick.html
https://thehackernews.com/2024/04/bogus-npm-packages-used-to-trick.html
π€25π12π₯11π3β‘1π1
Cybersecurity researchers have uncovered a targeted cyber attack against Ukraine that leveraged a 7-year-old Microsoft Office flaw to deploy Cobalt Strike beacons on victims' systems.
Read: https://thehackernews.com/2024/04/ukraine-targeted-in-cyberattack.html
Read: https://thehackernews.com/2024/04/ukraine-targeted-in-cyberattack.html
π€8β‘5π₯4π3π2
Heads up! Okta is sounding the alarm on an unprecedented spike in credential stuffing attacks targeting online services.
These attacks are powered by readily available tools and stolen credentials.
Details: https://thehackernews.com/2024/04/okta-warns-of-unprecedented-surge-in.html
These attacks are powered by readily available tools and stolen credentials.
Details: https://thehackernews.com/2024/04/okta-warns-of-unprecedented-surge-in.html
π15β‘8π2π₯1
π¨ Multiple vulnerabilities have been discovered in the popular Judge0 online code execution system, putting users at risk of complete system compromise.
Get the details: https://thehackernews.com/2024/04/sandbox-escape-vulnerabilities-in.html
Get the details: https://thehackernews.com/2024/04/sandbox-escape-vulnerabilities-in.html
π13β‘3π₯1