A new variant of RedLine Stealer, an information-stealing malware, has emerged using Lua bytecode to enhance its ability to evade detection. It is being distributed via repositories on GitHub disguised as game cheats.
Details: https://thehackernews.com/2024/04/new-redline-stealer-variant-disguised.html
Details: https://thehackernews.com/2024/04/new-redline-stealer-variant-disguised.html
π16π8π₯4β‘2
North Korea-linked hackers, like Emerald Sleet, are using AI, particularly large language models (LLMs), for cyber operations, including spear-phishing, vulnerability research, reconnaissance and creating malicious content.
Details: https://thehackernews.com/2024/04/microsoft-warns-north-korean-hackers.html
Details: https://thehackernews.com/2024/04/microsoft-warns-north-korean-hackers.html
π17π6β‘4π2
β οΈWindows users, watch out!
Researchers detail a vulnerability in the Windows DOS-to-NT path conversion process which can be exploited by threat actors to gain rootkit-like capabilities, hiding files and processes without admin permissions.
https://thehackernews.com/2024/04/researchers-uncover-windows-flaws.html
Researchers detail a vulnerability in the Windows DOS-to-NT path conversion process which can be exploited by threat actors to gain rootkit-like capabilities, hiding files and processes without admin permissions.
https://thehackernews.com/2024/04/researchers-uncover-windows-flaws.html
π21π7β‘6π€―3π±2
MITRE Corporation hit by nation-state attack exploiting zero-day flaws in Ivanti Connect Secure.
Read: https://thehackernews.com/2024/04/mitre-corporation-breached-by-nation.html
Read: https://thehackernews.com/2024/04/mitre-corporation-breached-by-nation.html
π24π€―11π6π€2
Companies use 53 (π€―) security solutions on average... yet still get breached. How can we bridge this gap?
Read the latest report: https://thehackernews.com/2024/04/penteras-2024-report-reveals-hundreds.html
Read the latest report: https://thehackernews.com/2024/04/penteras-2024-report-reveals-hundreds.html
π10π€―9π6π€4β‘2
Ransomware victims, beware of re-victimization!
Orange Cyberdefense finds some organizations are hit multiple times. Reasons include affiliate crossovers and data misuse. Learn how to protect your organization.
Read: https://thehackernews.com/2024/04/ransomware-double-dip-re-victimization.html
Orange Cyberdefense finds some organizations are hit multiple times. Reasons include affiliate crossovers and data misuse. Learn how to protect your organization.
Read: https://thehackernews.com/2024/04/ransomware-double-dip-re-victimization.html
π₯7π3
Kaspersky has uncovered a concerning threat actor, ToddyCat, targeting government and military entities.
This group employs a wide range of tools to maintain persistent access and steal data on an "industrial scale."
https://thehackernews.com/2024/04/russian-hacker-group-toddycat-uses.html
This group employs a wide range of tools to maintain persistent access and steal data on an "industrial scale."
https://thehackernews.com/2024/04/russian-hacker-group-toddycat-uses.html
π18π₯4
π Software supply chain breaches are a ticking time bomb. Forget playing defense - it's time to take the offensive against supply chain attackers.
β‘ Join our next cybersecurity webinar to learn battle-tested strategies from the experts.
Register now: https://thehacker.news/supply-chain-threats
β‘ Join our next cybersecurity webinar to learn battle-tested strategies from the experts.
Register now: https://thehacker.news/supply-chain-threats
thehacker.news
Supply Chain Under Siege: Unveiling Hidden Threats
Stop playing defenseβstart hunting threats. Protect your software supply chain with proactive strategies.
π20π4
π» Hackers linked to Russia have been exploiting a Windows bug for YEARS to deploy GooseEgg malware for escalating attack access.
More insights here... https://thehackernews.com/2024/04/russias-apt28-exploited-windows-print.html
More insights here... https://thehackernews.com/2024/04/russias-apt28-exploited-windows-print.html
π€―20π12π6
U.S. State Department imposed visa restrictions on 13 individuals linked to selling spyware for surveillance misuse targeting journalists, academics, and human rights defenders.
Read: https://thehackernews.com/2024/04/us-imposes-visa-restrictions-on-13.html
Read: https://thehackernews.com/2024/04/us-imposes-visa-restrictions-on-13.html
π16π6
The Great Privacy Debate >>
European law enforcement agencies are deeply concerned about the widespread use of end-to-end encryption (E2EE), indicating it could severely hamper efforts to tackle online crimes like child abuse and terrorism.
https://thehackernews.com/2024/04/police-chiefs-call-for-solutions-to.html
European law enforcement agencies are deeply concerned about the widespread use of end-to-end encryption (E2EE), indicating it could severely hamper efforts to tackle online crimes like child abuse and terrorism.
https://thehackernews.com/2024/04/police-chiefs-call-for-solutions-to.html
π€20π17
Germany issues arrest warrants for 3 citizens accused of spying for China to obtain sensitive tech data that could aid Beijing's military capabilities.
Find details here: https://thehackernews.com/2024/04/german-authorities-issue-arrest.html
Find details here: https://thehackernews.com/2024/04/german-authorities-issue-arrest.html
π€14π9π₯8π5
Lost revenue, angry customers, regulatory fines⦠cyberattacks have far-reaching consequences.
π Projected costs to hit $10.5 trillion by 2025
π 88% of breaches due to human error
Get the full story and prepare: https://thehackernews.com/2024/04/unmasking-true-cost-of-cyberattacks.html
π Projected costs to hit $10.5 trillion by 2025
π 88% of breaches due to human error
Get the full story and prepare: https://thehackernews.com/2024/04/unmasking-true-cost-of-cyberattacks.html
π22π€1
π¨ Researchers discovered a "dependency confusion" #vulnerability in an archived Apache project, Cordova App Harness.
Get all the details in our latest post: https://thehackernews.com/2024/04/apache-cordova-app-harness-targeted-in.html
Get all the details in our latest post: https://thehackernews.com/2024/04/apache-cordova-app-harness-targeted-in.html
π17π€5
A new malware campaign has been observed distributing three info-stealersβCryptBot, LummaC2, and Rhadamanthysβusing CDN cache domains to avoid detection.
Read: https://thehackernews.com/2024/04/coralraider-malware-campaign-exploits.html
Read: https://thehackernews.com/2024/04/coralraider-malware-campaign-exploits.html
π7π6π€―5
β οΈ Malware Alert: A sophisticated campaign called GuptiMiner is exploiting a vulnerability in eScan antivirus to distribute backdoors and crypto miners.
Read on to explore the potential state-sponsored ties: https://thehackernews.com/2024/04/escan-antivirus-update-mechanism.html
Read on to explore the potential state-sponsored ties: https://thehackernews.com/2024/04/escan-antivirus-update-mechanism.html
π9β‘4π4
β‘ Major security flaws uncovered in popular Chinese keyboard apps, which could expose users' private keystrokes.
Over 1 billion people using Baidu, Honor, iFlytek, OPPO, Samsung, Tencent, Vivo, and Xiaomi devices may be affected.
Details: https://thehackernews.com/2024/04/major-security-flaws-expose-keystrokes.html
Over 1 billion people using Baidu, Honor, iFlytek, OPPO, Samsung, Tencent, Vivo, and Xiaomi devices may be affected.
Details: https://thehackernews.com/2024/04/major-security-flaws-expose-keystrokes.html
π14π€―7π5π1
IT offboarding is my favorite task! Said no one, ever.
Automate 90% of IT manual offboarding tasks with Nudge Security. Discover ALL SaaS identities and automate steps to revoke access, including OAuth grants and non-SSO accounts.
Get started here: https://thn.news/automated-it-offboarding-software
Automate 90% of IT manual offboarding tasks with Nudge Security. Discover ALL SaaS identities and automate steps to revoke access, including OAuth grants and non-SSO accounts.
Get started here: https://thn.news/automated-it-offboarding-software
Nudgesecurity
2024 Employee Offboarding Software | Nudge Security
Nudge Security ensures that all access to your cloud and SaaS systems and data remains intact during employee turnover.
π14π₯8
π΅οΈββοΈ Heads up! Researchers have uncovered a sneaky attack delivering malware called SSLoad through phishing emails. This cunning malware infiltrates systems, steals sensitive data, and relays it back to the attackers.
Read: https://thehackernews.com/2024/04/researchers-detail-multistage-attack.html
Read: https://thehackernews.com/2024/04/researchers-detail-multistage-attack.html
π7π2
U.S. Treasury Department has sanctioned two Iranian firms and four individuals for their involvement in malicious cyber activities targeting U.S. companies and government entities on behalf of the IRGC-CEC.
More details. π https://thehackernews.com/2024/04/us-treasury-sanctions-iranian-firms-and.html
More details. π https://thehackernews.com/2024/04/us-treasury-sanctions-iranian-firms-and.html
π12π5