Researchers have disclosed details of three new security vulnerabilities affecting Operational Technology (OT) products from CODESYS and Festo.
Read: https://thehackernews.com/2022/11/3-new-vulnerabilities-affect-ot.html
Read: https://thehackernews.com/2022/11/3-new-vulnerabilities-affect-ot.html
π15π₯3π€3β‘1
Australian government has passed a new bill that significantly increases penalties (up to $50 million) for companies affected by serious or repeated data breaches.
Read: https://thehackernews.com/2022/11/australia-passes-bill-to-fine-companies.html
Read: https://thehackernews.com/2022/11/australia-passes-bill-to-fine-companies.html
π27π7π₯5β‘4π±3
French data protection watchdog has fined the country's largest electricity provider ElectricitΓ© de France (EDF) β¬600,000 for using insecure MD5 hash algorithm to store its customers' passwords.
Read: https://thehackernews.com/2022/11/french-electricity-provider-fined-for.html
Read: https://thehackernews.com/2022/11/french-electricity-provider-fined-for.html
π34π15π₯12π€―12π±4β‘1
A malicious Android app distributed through the Google Play Store secretly collected users' text messages in order to create accounts on various platforms, including Facebook, Google, and WhatsApp.
https://thehackernews.com/2022/11/this-malicious-app-abused-hacked.html
https://thehackernews.com/2022/11/this-malicious-app-abused-hacked.html
π31π₯12π€―9π±6β‘5π€4π2
An "unexpected behavior" in the npm command line interface could allow malicious NPM libraries to bypass security checks and hide vulnerabilities.
Read: https://thehackernews.com/2022/11/researchers-find-way-malicious-npm.html
Read: https://thehackernews.com/2022/11/researchers-find-way-malicious-npm.html
π₯21π±20π8π2β‘1π1
North Korea-linked ScarCruft APT hackers have been spotted using a previously undocumented backdoor called "Dolphin" to spy on targets in its southern counterpart.
Read: https://thehackernews.com/2022/12/north-korea-hackers-using-new-dolphin.html
Read: https://thehackernews.com/2022/12/north-korea-hackers-using-new-dolphin.html
π±19π8β‘4π€4π₯1π1
LastPass password management service has been hit by another security incident in which attackers gained access to some of its customers' data.
Read: https://thehackernews.com/2022/12/lastpass-suffers-another-security.html
Read: https://thehackernews.com/2022/12/lastpass-suffers-another-security.html
π±46π19π11π₯5π€―5β‘3π3
Researchers 'accidentally' crash the KMSDBot cryptocurrency mining botnet while sending commands to the bot to test its functionality and attack signatures.
Read: https://thehackernews.com/2022/12/researchers-accidentally-crashed.html
Read: https://thehackernews.com/2022/12/researchers-accidentally-crashed.html
π38π16π₯5π4π±3π€2β‘1
Over 300,000 Android users have fallen victim to dozens of Google Play Store apps that contain the Schoolyard Bully Trojan and steal users' Facebook credentials.
Read: https://thehackernews.com/2022/12/schoolyard-bully-trojan-apps-stole.html
Read: https://thehackernews.com/2022/12/schoolyard-bully-trojan-apps-stole.html
π32π16π€―11β‘10π5π€4
Hackers behind the devastating cyberattack on Australian insurer Medibank have posted another dump of the stolen data on the dark web after the company refused to pay a ransom.
Read: https://thehackernews.com/2022/12/hackers-leak-another-set-of-medibank.html
Read: https://thehackernews.com/2022/12/hackers-leak-another-set-of-medibank.html
π€―26π15π€10π±10π₯4β‘3π2
Google accuses a Barcelona-based surveillanceware vendor named Variston IT of planting #spyware on targeted devices by exploiting zero-day vulnerabilities in Google Chrome, Mozilla Firefox and Windows.
Details: https://thehackernews.com/2022/12/google-accuses-spanish-spyware-vendor.html
Details: https://thehackernews.com/2022/12/google-accuses-spanish-spyware-vendor.html
π₯40π€16π10β‘8π±6π3
Multiple unpatched vulnerabilities have been discovered in the remote keyboard and mouse apps 'Lazy Mouse,' 'PC Keyboard' and 'Telepad' β installed by more than two million Android users.
Read: https://thehackernews.com/2022/12/watch-out-these-android-keyboard-apps.html
Read: https://thehackernews.com/2022/12/watch-out-these-android-keyboard-apps.html
β‘15π10π±5π4
U.S. cybersecurity agency warns of an increasing number of Cuba ransomware attacks that has extorted more than $60 MILLION in ransom payments from over 100 entities across the world.
Read: https://thehackernews.com/2022/12/cuba-ransomware-extorted-over-60.html
Read: https://thehackernews.com/2022/12/cuba-ransomware-extorted-over-60.html
β‘29π₯8π6π6π€4π±1
Hackers are exploiting a vulnerability in the Redis database application to deploy a new Go-based malware, dubbed "Redigo," that is designed to take control of servers and build botnet networks.
Details: https://thehackernews.com/2022/12/hackers-exploiting-redis-vulnerability.html
Details: https://thehackernews.com/2022/12/hackers-exploiting-redis-vulnerability.html
π13π₯12π4π4β‘3
CISA warns of several critical vulnerabilities in Mitsubishi Electric GX Works3 engineering software, which is widely used in the ICS environment.
Read: https://thehackernews.com/2022/12/cisa-warns-of-multiple-critical.html
Read: https://thehackernews.com/2022/12/cisa-warns-of-multiple-critical.html
π17π€―4β‘3π1
Researchers have uncovered a high-severity security vulnerability in IBM Cloud Databases for PostgreSQL that could be exploited to tamper with internal repositories and execute unauthorized code.
Read: https://thehackernews.com/2022/12/researchers-disclose-supply-chain-flaw.html
Read: https://thehackernews.com/2022/12/researchers-disclose-supply-chain-flaw.html
π€13π12π6β‘5π5π±1
Hackers abused compromised platform certificates used by Android smartphone vendors such as Samsung, LG, and MediaTek to sign malicious apps and bypass security checks.
Read: https://thehackernews.com/2022/12/hackers-sign-android-malware-apps-with.html
Read: https://thehackernews.com/2022/12/hackers-sign-android-malware-apps-with.html
π45π€―19π₯14π€8π±3β‘2π2
A new RCE vulnerability [CVE-2022-23093] has been reported in the ping module of the FreeBSD operating system that could be exploited to remotely crash the program or execute malicious code.
Read: https://thehackernews.com/2022/12/critical-ping-vulnerability-allows.html
Read: https://thehackernews.com/2022/12/critical-ping-vulnerability-allows.html
π€―28π13π±13π9π5π€5β‘3π₯1
North Korean Lazarus hackers have been spotted distributing fake cryptocurrency apps to attack users with a new variant of AppleJeus malware.
Read: https://thehackernews.com/2022/12/north-korean-hackers-spread-applejeus.html
Read: https://thehackernews.com/2022/12/north-korean-hackers-spread-applejeus.html
π17π10π€―9π8π₯8β‘4π€4
Researchers have discovered a security vulnerability in SiriusXM services that allows remote hacking of connected cars from Honda, Nissan, Infiniti and Acura.
Read: https://thehackernews.com/2022/12/siriusxm-vulnerability-lets-hackers.html
Read: https://thehackernews.com/2022/12/siriusxm-vulnerability-lets-hackers.html
π20π19π₯6β‘4