How are hackers getting around malware detection?
They're using sneaky unsupported compression methods in Android APK files to evade detection!
These undetectable apps, with 3,300 cases found, are harder to analyze.
Details: https://thehackernews.com/2023/08/thousands-of-android-malware-apps-using.html
They're using sneaky unsupported compression methods in Android APK files to evade detection!
These undetectable apps, with 3,300 cases found, are harder to analyze.
Details: https://thehackernews.com/2023/08/thousands-of-android-malware-apps-using.html
π12π12π₯8π€―7π6β‘2π€2
Juniper Networks released an "out-of-cycle" security patch for Junos OS.
J-Web component flaws have a CVSS rating of 9.8/10, making them a 'Critical' watch-out!
Read details: https://thehackernews.com/2023/08/new-juniper-junos-os-flaws-expose.html
Attackers could remotely execute code by chaining these vulnerabilities.
J-Web component flaws have a CVSS rating of 9.8/10, making them a 'Critical' watch-out!
Read details: https://thehackernews.com/2023/08/new-juniper-junos-os-flaws-expose.html
Attackers could remotely execute code by chaining these vulnerabilities.
π25π₯8β‘6π€3π€―1
Sophisticated WoofLocker toolkit update hides malicious JavaScript in PNG images, tricks users with fake tech support scams using advanced fingerprinting and redirection mechanisms.
Read: https://thehackernews.com/2023/08/wooflocker-toolkit-hides-malicious.html
Read: https://thehackernews.com/2023/08/wooflocker-toolkit-hides-malicious.html
π€―38π15π₯6π6π3π€2
HiatusRAT malware creators return, targeting Taiwan-based orgs & U.S. military procurement system.
Upgraded malware now supports multiple architectures & hosted on new VPSs.
Read details: https://thehackernews.com/2023/08/hiatusrat-malware-resurfaces-taiwan.html
Upgraded malware now supports multiple architectures & hosted on new VPSs.
Read details: https://thehackernews.com/2023/08/hiatusrat-malware-resurfaces-taiwan.html
β‘15π12π6π€―1
Malware-infected Windows & macOS machines are now being used as proxy exit nodes, allowing threat actors to reroute requests.
Read: https://thehackernews.com/2023/08/this-malware-turned-thousands-of-hacked.html
Read: https://thehackernews.com/2023/08/this-malware-turned-thousands-of-hacked.html
π30π₯10π5π5π€1
A high-severity flaw in WinRAR could let hackers remotely run code on Windows systems.
Learn more about CVE-2023-40477: https://thehackernews.com/2023/08/new-winrar-vulnerability-could-allow.html
Learn more about CVE-2023-40477: https://thehackernews.com/2023/08/new-winrar-vulnerability-could-allow.html
π±37π14β‘8π₯8π7π5π€―5π€2
Critical security flaw (CVE-2023-26359) in Adobe ColdFusion added to CISA's catalog of known exploited vulnerabilities.
Read: https://thehackernews.com/2023/08/critical-adobe-coldfusion-flaw-added-to.html
Affects ColdFusion 2018 and 2021. Patched by Adobe in March, but active exploitation evidence is concerning.
Read: https://thehackernews.com/2023/08/critical-adobe-coldfusion-flaw-added-to.html
Affects ColdFusion 2018 and 2021. Patched by Adobe in March, but active exploitation evidence is concerning.
π10π9π±6π₯2
Beware #macOS users! A sneaky variant of the XLoader malware hides inside an app called "OfficeNote."
Think you're boosting productivity? You might be compromising security!
Read details: https://thehackernews.com/2023/08/new-variant-of-xloader-macos-malware.html
Think you're boosting productivity? You might be compromising security!
Read details: https://thehackernews.com/2023/08/new-variant-of-xloader-macos-malware.html
π20π±15π6π₯3
Carderbee, a new threat cluster, is targeting organizations in Hong Kong and Asia.
The breach uses software supply chain attacks and a Microsoft signed certificate to fetch PlugX from a remote server.
Read more: https://thehackernews.com/2023/08/carderbee-attacks-hong-kong.html
The breach uses software supply chain attacks and a Microsoft signed certificate to fetch PlugX from a remote server.
Read more: https://thehackernews.com/2023/08/carderbee-attacks-hong-kong.html
π₯17π7π5
Beware Roblox developers! Malicious packages on the npm repository have been found. These imposters are deploying Luna Token Grabber to snatch credentials.
Read details: https://thehackernews.com/2023/08/over-dozen-malicious-npm-packages.html
Read details: https://thehackernews.com/2023/08/over-dozen-malicious-npm-packages.html
π12π7π₯4
π‘οΈ Beware of Spacecolon! This malicious tool is spreading Scarab ransomware globally. France, Mexico, Poland, Slovakia, Spain, and Turkey are among the top targets.
Read detais: https://thehackernews.com/2023/08/spacecolon-toolset-fuels-global-surge.html
Read detais: https://thehackernews.com/2023/08/spacecolon-toolset-fuels-global-surge.html
π₯16π9π€2π±2
A Syrian threat actor, EVLF, has been identified as the developer of malware tools CypherRAT and CraxsRAT. These tools can control a device's camera, location, and mic remotely.
Read details: https://thehackernews.com/2023/08/syrian-threat-actor-evlf-unmasked-as.html
Read details: https://thehackernews.com/2023/08/syrian-threat-actor-evlf-unmasked-as.html
π22π₯6π€3
Meta is set to support end-to-end encryption for Messenger chats by year-end. Meta redesigned over 100 Messenger features to keep your chats both safe and seamless.
Read: https://thehackernews.com/2023/08/meta-set-to-enable-default-end-to-end.html
Read: https://thehackernews.com/2023/08/meta-set-to-enable-default-end-to-end.html
π€28π14π13
FBI alerts of a potential cash out by North Korean actors, linked to $40M in stolen cryptocurrency. This group is currently holding 1,580 bitcoins from various crypto heists across six wallets.
Read details: https://thehackernews.com/2023/08/north-korean-affiliates-suspected-in.html
Read details: https://thehackernews.com/2023/08/north-korean-affiliates-suspected-in.html
π18π18β‘12π€―11π€2
Agile isn't just for devs anymore! Watch how an attacker develops and releases malware iterations targeting cloud credentials.
Learn more: https://thehackernews.com/2023/08/agile-approach-to-mass-cloud-credential.html
Learn more: https://thehackernews.com/2023/08/agile-approach-to-mass-cloud-credential.html
π31π₯10π6π4
The U.S. Justice Department indicts two founders of Tornado Cash, a cryptocurrency mixer service, for laundering over $1 billion in criminal proceeds.
Read details: https://thehackernews.com/2023/08/tornado-cash-founders-charged-in.html
Read details: https://thehackernews.com/2023/08/tornado-cash-founders-charged-in.html
π20π₯4π4π€―1
π₯ Thousands of Openfire XMPP servers remain unpatched against a high-severity flaw, CVE-2023-32315, exposing them to exploits.
Read details: https://thehackernews.com/2023/08/thousands-of-unpatched-openfire-xmpp.html
Don't wait β update now to prevent potential breaches.
Read details: https://thehackernews.com/2023/08/thousands-of-unpatched-openfire-xmpp.html
Don't wait β update now to prevent potential breaches.
π₯14π6π€―6π1
π¨ Heads up! The recent WinRAR vulnerability was exploited as a zero-day since April to compromise traders' devices and withdraw money from broker accounts.
Read: https://thehackernews.com/2023/08/winrar-security-flaw-exploited-in-zero.html
Read: https://thehackernews.com/2023/08/winrar-security-flaw-exploited-in-zero.html
π₯25π±9π6π2π2
π₯οΈ A new malware called "Whiffy Recon" is targeting Windows devices and scanning for Wi-Fi access points to triangulate infected devices' exact location every 60 seconds.
Learn more about it: https://thehackernews.com/2023/08/new-whiffy-recon-malware-triangulates.html
Learn more about it: https://thehackernews.com/2023/08/new-whiffy-recon-malware-triangulates.html
π±17π13π₯6π€―6π3
Connecting to that βοΈ coffee shop's Wi-Fi? Beware! Attackers might be eavesdropping.
MiTM attacks, Rogue hotspots, Spoofing⦠Sounds complex?
Discover what these threats mean for you when using public Wi-Fi: https://thehackernews.com/2023/08/the-hidden-dangers-of-public-wi-fi.html
MiTM attacks, Rogue hotspots, Spoofing⦠Sounds complex?
Discover what these threats mean for you when using public Wi-Fi: https://thehackernews.com/2023/08/the-hidden-dangers-of-public-wi-fi.html
π28π₯8π±6