Researchers issue warning for latest threat to cryptocurrency users - Enigma malware, Vector stealer, and TgToxic trojan.
Read: https://thehackernews.com/2023/02/enigma-vector-and-tgtoxic-new-threats.html
Read: https://thehackernews.com/2023/02/enigma-vector-and-tgtoxic-new-threats.html
👍31⚡5👏3😱3🤯2
Game of cat and mouse continues...
Following CISA's release of a decryption tool for ESXiArgs ransomware, cybercriminals have upgraded the malware to encrypt more data with stronger encryption methods.
Learn more: https://thehackernews.com/2023/02/new-esxiargs-ransomware-variant-emerges.html
Following CISA's release of a decryption tool for ESXiArgs ransomware, cybercriminals have upgraded the malware to encrypt more data with stronger encryption methods.
Learn more: https://thehackernews.com/2023/02/new-esxiargs-ransomware-variant-emerges.html
🔥33😱14👍11😁10⚡8🤯5🤔3
Researchers are tracking a new financially motivated threat actor, TA866, which has been active since October 2022 and using custom hacking tools like WasabiSeed and Screenshotter to attack U.S. and German organizations.
Learn more: https://thehackernews.com/2023/02/hackers-targeting-us-and-german-firms.html
Learn more: https://thehackernews.com/2023/02/hackers-targeting-us-and-german-firms.html
👍16🤯3🤔2
Chinese Tonto Team just suffered a defeat in their latest hack attempt on cybersecurity firm Group-IB.
Learn more: https://thehackernews.com/2023/02/chinese-tonto-team-hackers-second.html
Learn more: https://thehackernews.com/2023/02/chinese-tonto-team-hackers-second.html
🔥19👍14😁13
Cybersecurity for operational technology is crucial in protecting industrial control systems from attacks.
Learn how deception technology is making a difference: https://thehackernews.com/2023/02/honeypot-factory-use-of-deception-in.html
Honeypots like Conpot, XPOT, and CryPLH can simulate protocols and improve threat detection.
Learn how deception technology is making a difference: https://thehackernews.com/2023/02/honeypot-factory-use-of-deception-in.html
Honeypots like Conpot, XPOT, and CryPLH can simulate protocols and improve threat detection.
👍23👏5😱2🔥1
An unknown threat actor created malicious game modes for the Dota 2 MOBA video game that could have been exploited to establish backdoor access to players' systems, exploiting a high-severity flaw in the V8 JavaScript engine.
Learn more: https://thehackernews.com/2023/02/hackers-create-malicious-dota-2-game.html
Learn more: https://thehackernews.com/2023/02/hackers-create-malicious-dota-2-game.html
😁29😱14👍8🔥5👏4⚡3🤔3
⚡ Apple has released URGENT security updates to address a new ZERO-DAY vulnerability (CVE-2023-23529) discovered in WebKit that attackers are exploiting in the wild.
Learn more: https://thehackernews.com/2023/02/patch-now-apples-ios-ipados-macos-and.html
Update iOS, iPadOS, macOS systems & Safari immediately to stay protected.
Learn more: https://thehackernews.com/2023/02/patch-now-apples-ios-ipados-macos-and.html
Update iOS, iPadOS, macOS systems & Safari immediately to stay protected.
👍49😁14🤯5🔥2😱1
Holy moly! Cloudflare thwarted a massive DDoS attack that peaked at over 71 million requests per second, setting a new record for HTTP attacks.
Learn more: https://thehackernews.com/2023/02/massive-http-ddos-attack-hits-record.html
Learn more: https://thehackernews.com/2023/02/massive-http-ddos-attack-hits-record.html
🔥63😱40👍21🤯8⚡6👏6
Microsoft has linked an emerging threat cluster, DEV-0147, to a China-based cyberespionage group that is utilizing ShadowPad and QuasarLoader to infiltrate diplomatic entities in South America.
Learn more: https://thehackernews.com/2023/02/chinese-hackers-targeting-south.html
Learn more: https://thehackernews.com/2023/02/chinese-hackers-targeting-south.html
👍13👏8😱8😁7⚡4
🚨 Attention all Windows users: Microsoft has released 75 new software security updates, including fixes for 3 actively exploited vulnerabilities.
Learn more: https://thehackernews.com/2023/02/update-now-microsoft-releases-patches.html
Learn more: https://thehackernews.com/2023/02/update-now-microsoft-releases-patches.html
🔥21👍11⚡4😁2🤔1
Heads up, Python developers! Over 451 malicious Python packages have been found in the PyPI repository, designed to steal your cryptocurrency with Clipper malware.
Learn more: https://thehackernews.com/2023/02/python-developers-beware-clipper.html
Learn more: https://thehackernews.com/2023/02/python-developers-beware-clipper.html
🤯24👍9😱9⚡7👏4🔥3🤔1
Over 10,000+ WordPress websites have been compromised in a recent massive AdSense fraud campaign using fake URL shorteners.
Learn more: https://thehackernews.com/2023/02/massive-adsense-fraud-campaign.html
Learn more: https://thehackernews.com/2023/02/massive-adsense-fraud-campaign.html
😁20👍8⚡5🔥5👏1
Google is rolling out Privacy Sandbox Beta to Android 13, providing new APIs to display personalized ads without compromising user privacy.
Learn more: https://thehackernews.com/2023/02/google-rolling-out-privacy-sandbox-beta.html
Learn more: https://thehackernews.com/2023/02/google-rolling-out-privacy-sandbox-beta.html
⚡12👍10🤔8😁5
Cybersecurity researchers have discovered a new evasive malware, "Beep," which drops an information stealer onto compromised hosts.
Read details: https://thehackernews.com/2023/02/experts-warn-of-beep-new-evasive.html
Read details: https://thehackernews.com/2023/02/experts-warn-of-beep-new-evasive.html
🔥16👍8⚡5🤯5
A financially motivated threat actor is targeting individuals and businesses using a new strain of ransomware (MortalKombat) and a clipper malware (Laplas) to steal cryptocurrencies from its victims.
Learn more: https://thehackernews.com/2023/02/financially-motivated-threat-actor.html
Learn more: https://thehackernews.com/2023/02/financially-motivated-threat-actor.html
🔥12👍11⚡6🤔2
Hey 👋 Hacker News Telegram community,
We are excited to invite you to register for 3 upcoming CYBERSECURITY WEBINARS that we believe will be incredibly informative and valuable.
1️⃣ MythBusting Special: 9 Myths about File-based Threats
Do you have misconceptions about file-based threats? This webinar will explore and debunk nine common myths surrounding this type of cybersecurity threat. You'll learn what file-based threats are, how they work, and how to protect your organization against them.
Register — https://thehacker.news/file-based-threats-webinar?source=telegram
2️⃣ How to Tackle the Top SaaS Security Challenges of 2023
As more companies move to the cloud and rely on Software as a Service (SaaS) solutions, the security challenges are changing. This webinar will focus on the top security challenges facing organizations in 2023 and provide practical solutions to mitigate these risks.
Register — https://thehacker.news/saas-security-webinar?source=telegram
3️⃣ Understanding Cyber Insurance Identity Security Requirements for 2023
Cyber insurance is becoming increasingly important for organizations of all sizes. However, navigating the requirements and options can be confusing. This webinar will explore the identity security requirements that organizations should be aware of when considering cyber insurance.
Register — https://thehacker.news/cyber-insurance-webinar?source=telegram
We strongly encourage all of you to register for these webinars and take advantage of the expertise and insights that they offer.
We are excited to invite you to register for 3 upcoming CYBERSECURITY WEBINARS that we believe will be incredibly informative and valuable.
1️⃣ MythBusting Special: 9 Myths about File-based Threats
Do you have misconceptions about file-based threats? This webinar will explore and debunk nine common myths surrounding this type of cybersecurity threat. You'll learn what file-based threats are, how they work, and how to protect your organization against them.
Register — https://thehacker.news/file-based-threats-webinar?source=telegram
2️⃣ How to Tackle the Top SaaS Security Challenges of 2023
As more companies move to the cloud and rely on Software as a Service (SaaS) solutions, the security challenges are changing. This webinar will focus on the top security challenges facing organizations in 2023 and provide practical solutions to mitigate these risks.
Register — https://thehacker.news/saas-security-webinar?source=telegram
3️⃣ Understanding Cyber Insurance Identity Security Requirements for 2023
Cyber insurance is becoming increasingly important for organizations of all sizes. However, navigating the requirements and options can be confusing. This webinar will explore the identity security requirements that organizations should be aware of when considering cyber insurance.
Register — https://thehacker.news/cyber-insurance-webinar?source=telegram
We strongly encourage all of you to register for these webinars and take advantage of the expertise and insights that they offer.
thehacker.news
A MythBusting Special — 9 Myths about File-based Threats
Cybersecurity Webinar: Say goodbye to the myths and hello to the facts - Register for our webinar on file-based threats now!
👍84🔥19👏12⚡8😁3🤯2😱1
ESXiArgs ransomware is spreading fast and has infected over 500 new hosts in France, Germany, the Netherlands, the UK, and Ukraine.
Learn more: https://thehackernews.com/2023/02/esxiargs-ransomware-hits-over-500-new.html
Learn more: https://thehackernews.com/2023/02/esxiargs-ransomware-hits-over-500-new.html
👍20🔥7⚡3👏2
Cybersecurity experts are 🚨 cautioning of a new, previously unreported threat actor located in the Middle East that is targeting telecommunications service providers.
Read details: https://thehackernews.com/2023/02/new-threat-actor-wip26-targeting.html
Read details: https://thehackernews.com/2023/02/new-threat-actor-wip26-targeting.html
⚡17👍9🤔6
Cybercriminals are using Google ads to spread FatalRAT malware disguised as popular apps like Chrome, Firefox, Telegram, WhatsApp, LINE, Signal, and Skype to target Chinese-speaking individuals in Southeast and East Asia.
Read details: https://thehackernews.com/2023/02/hackers-using-google-ads-to-spread.html
Read details: https://thehackernews.com/2023/02/hackers-using-google-ads-to-spread.html
👍29😁9🔥8🤯7🤔5👏3
Heads up, developers! A popular npm package with 3.5 million weekly downloads has been found vulnerable to an account takeover attack.
Read details: https://thehackernews.com/2023/02/researchers-hijack-popular-npm-package.html
Read details: https://thehackernews.com/2023/02/researchers-hijack-popular-npm-package.html
👍21😱10😁9⚡5👏3