Okta Hackers behind the cyberattacks on Twilio and Cloudflare earlier this month have been linked to a broader campaign that compromised 9,931 accounts at 136 organizations.
Read details: https://thehackernews.com/2022/08/okta-hackers-behind-twilio-and.html
Read details: https://thehackernews.com/2022/08/okta-hackers-behind-twilio-and.html
👍39🤔6😱1
Nation-state threat actors are increasingly adopting and integrating the "Sliver" command-and-control (C2) framework into their intrusion campaigns as a replacement for Cobalt Strike.
Read details: https://thehackernews.com/2022/08/cybercrime-groups-increasingly-adopting.html
Read details: https://thehackernews.com/2022/08/cybercrime-groups-increasingly-adopting.html
👍43🤔11😁5
Iranian state-sponsored hacker 'MERCURY' are leaving no stone unturned to exploit unpatched systems with Log4j to target Israeli entities, suggesting that the vulnerability's long tail for remediation.
Read details: https://thehackernews.com/2022/08/iranian-hackers-exploiting-unpatched.html
Read details: https://thehackernews.com/2022/08/iranian-hackers-exploiting-unpatched.html
🔥49👍27🤔14😱11😁7🤯5👏4
CISA has added 10 actively exploited vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, including flaws in dotCMS, CouchDB, WebRTC, iOS, macOS, and Delta Electronics' industrial automation #software.
Details: https://thehackernews.com/2022/08/cisa-adds-10-new-known-actively.html
Details: https://thehackernews.com/2022/08/cisa-adds-10-new-known-actively.html
👍20😱15👏6🤔1
Twilio says hackers also gained access to the two-factor authentication (2FA) Authy accounts of 93 users in a recent security breach.
Read details: https://thehackernews.com/2022/08/twilio-breach-also-compromised-authy.html
Read details: https://thehackernews.com/2022/08/twilio-breach-also-compromised-authy.html
😱35👍20😁16🤔1
Researchers uncover an active cryptocurrency mining campaign that infected over 111,000 victims in 11 countries using fake software disguised as installers for popular applications.
Read details: https://thehackernews.com/2022/08/nitrokod-crypto-miner-infected-over.html
Read details: https://thehackernews.com/2022/08/nitrokod-crypto-miner-infected-over.html
👍30😱10👏4🤔1
A new ransomware strain written in Golang dubbed "Agenda", which comes with the ability to customize binary payloads for individual victims, has been spotted in the wild targeting healthcare and education entities.
Details: https://thehackernews.com/2022/08/new-golang-based-agenda-ransomware-can.html
Details: https://thehackernews.com/2022/08/new-golang-based-agenda-ransomware-can.html
😱27👍12🤯11🔥7🤔2
The U.S. Federal Trade Commission (FTC) has filed suit against Kochava, a location data broker, for collecting and selling precise geolocation data gathered from hundreds of millions of consumers' mobile devices.
Details: https://thehackernews.com/2022/08/ftc-sues-data-broker-over-selling.html
Details: https://thehackernews.com/2022/08/ftc-sues-data-broker-over-selling.html
👏32👍11🤯7🤔5🔥3
India's newest commercial airline, "Akasa Air," has had its customers' personal data exposed, which the company attributes to a technical configuration error.
Read details: https://thehackernews.com/2022/08/indias-newest-airline-akasa-air-suffers.html
Read details: https://thehackernews.com/2022/08/indias-newest-airline-akasa-air-suffers.html
😁34🤯17👍10🔥10👏7
Researchers uncover three related but distinct campaigns that spread malware such as ModernLoader, RedLine stealer, and cryptocurrency miners.
Read: https://thehackernews.com/2022/08/hackers-use-modernloader-to-infect.html
Read: https://thehackernews.com/2022/08/hackers-use-modernloader-to-infect.html
👍23🔥14🤯2
A Chinese hacker group conducted a months-long cyberespionage campaign against several entities using ScanBox Reconnaissance Framework to gather information about its victims.
Read details: https://thehackernews.com/2022/08/chinese-hackers-used-scanbox-framework.html
Read details: https://thehackernews.com/2022/08/chinese-hackers-used-scanbox-framework.html
👍20😁6😱5
Google has introduced a new bug bounty program for its open source projects, with payouts ranging from $100 to $31,337 to protect the ecosystem from supply chain attacks.
Read details: https://thehackernews.com/2022/08/google-launches-new-open-source-bug.html
Read details: https://thehackernews.com/2022/08/google-launches-new-open-source-bug.html
🔥50👍18👏10
A persistent Golang-based malware campaign is leveraging the deep field image taken from NASA's James Webb Space Telescope (JWST) as bait to install malicious payloads on infected systems.
Read details: https://thehackernews.com/2022/08/hackers-hide-malware-in-stunning-images.html
Read details: https://thehackernews.com/2022/08/hackers-hide-malware-in-stunning-images.html
👍28🤔12🔥9
Researchers uncover malicious Chrome browser extensions with a total install base of over 1,400,000 that are masquerading as Netflix viewers and profiting from retail affiliate programs.
Read details: https://thehackernews.com/2022/08/experts-find-malicious-cookie-stuffing.html
Read details: https://thehackernews.com/2022/08/experts-find-malicious-cookie-stuffing.html
👍27🔥11
Apple has backported a security patch to older iPhones, iPads and iPod touch models to address a critical vulnerability that has been actively exploited in the wild.
Read details — https://thehackernews.com/2022/09/apple-releases-ios-update-for-older.html
Read details — https://thehackernews.com/2022/09/apple-releases-ios-update-for-older.html
👍39
A newly reported "high severity vulnerability" in the TikTok app for Android could have allowed attackers to take over accounts.
Read details: https://thehackernews.com/2022/09/microsoft-discover-severe-one-click.html
Read details: https://thehackernews.com/2022/09/microsoft-discover-severe-one-click.html
👍23😁22🔥9👏5🤔4
Researchers have found that the attack infrastructure used to hack Cisco in May 2022 was also used to attack the holding company of an unnamed large workforce management solutions company.
Read details: https://thehackernews.com/2022/09/infra-used-in-cisco-hack-also-targeted.html
Read details: https://thehackernews.com/2022/09/infra-used-in-cisco-hack-also-targeted.html
😁7👍6🤔1
Researchers have identified over 1,800 apps for Android and iOS containing hard-coded Amazon Web Services (AWS) credentials, posing a major security risk.
Read details: https://thehackernews.com/2022/09/over-1800-android-and-ios-apps-found.html
Read details: https://thehackernews.com/2022/09/over-1800-android-and-ios-apps-found.html
🔥43😁14👍13🤯10⚡8👏4🤔1😱1
Researchers detail the operations and techniques used by the operators of the emerging cross-platform BianLian ransomware.
Read details: https://thehackernews.com/2022/09/researchers-detail-emerging-cross.html
Read details: https://thehackernews.com/2022/09/researchers-detail-emerging-cross.html
👍20
Google Chrome as well as Chromium-based alternative web browsers have a "major" security issue that could allow malicious websites to overwrite the contents of the system clipboard without the user's consent.
Details: https://thehackernews.com/2022/09/google-chrome-bug-lets-sites-silently.html
Details: https://thehackernews.com/2022/09/google-chrome-bug-lets-sites-silently.html
😱46🔥20👍16😁9