The new #YARA search tool from AnyRun helps you quickly find relevant threats.
🔍 Scan the service's public malware database using your own YARA rules to identify matching files. Explore the findings further in the sandbox.
Learn more ➡️ https://thehackernews.uk/yara-malware-search
🔍 Scan the service's public malware database using your own YARA rules to identify matching files. Explore the findings further in the sandbox.
Learn more ➡️ https://thehackernews.uk/yara-malware-search
ANY.RUN's Cybersecurity Blog
Find Malware by File Contents with YARA Search
Explore the new YARA Search tool from ANY.RUN. Find relevant malware samples using your own YARA rules and study them in the sandbox.
🔥17👍10😁4⚡1
North Korean hackers used fake job offers to deliver a new Trojan called Kaolin RAT. It can change file timestamps and load malware - a gateway to the dangerous FudModule rootkit.
Details here: https://thehackernews.com/2024/04/north-koreas-lazarus-group-deploys-new.html
Details here: https://thehackernews.com/2024/04/north-koreas-lazarus-group-deploys-new.html
🤯24👍11🔥8⚡1😁1
🚨 Attention WordPress users!
A critical SQL injection vulnerability (CVE-2024-27956) in the WP-Automatic plugin is being actively exploited. With a max severity of 9.9/10, this bug enables site takeovers and malicious activities.
Details: https://thehackernews.com/2024/04/hackers-exploiting-wp-automatic-plugin.html
A critical SQL injection vulnerability (CVE-2024-27956) in the WP-Automatic plugin is being actively exploited. With a max severity of 9.9/10, this bug enables site takeovers and malicious activities.
Details: https://thehackernews.com/2024/04/hackers-exploiting-wp-automatic-plugin.html
👍19😁8🤯8🔥4⚡2
⚠️ Attention Android users!
A new malware called Brokewell is disguising itself as updates for popular apps like Google Chrome and Klarna. Don't fall for these fake updates.
Click to find out more: https://thehackernews.com/2024/04/new-brokewell-android-malware-spread.html
A new malware called Brokewell is disguising itself as updates for popular apps like Google Chrome and Klarna. Don't fall for these fake updates.
Click to find out more: https://thehackernews.com/2024/04/new-brokewell-android-malware-spread.html
😁12👍7⚡2🤔2😱1
🆘 Attention, Palo Alto Networks users!
A critical vulnerability (CVE-2024-3400) in PAN-OS could expose your systems to remote code execution attacks.
Good news: Hotfixes and remediation steps available.
Read full advisory: https://thehackernews.com/2024/04/palo-alto-networks-outlines-remediation.html
A critical vulnerability (CVE-2024-3400) in PAN-OS could expose your systems to remote code execution attacks.
Good news: Hotfixes and remediation steps available.
Read full advisory: https://thehackernews.com/2024/04/palo-alto-networks-outlines-remediation.html
🤯16👍11🤔3⚡1
🛡️ Did you know 70% of successful breaches begin at the endpoint? Unprotected devices are gateways for devastating cyberattacks.
This guide shares 10 must-know tips, from identifying vulnerabilities to implementing robust security solutions: https://thehackernews.com/2024/04/10-critical-endpoint-security-tips-you.html
This guide shares 10 must-know tips, from identifying vulnerabilities to implementing robust security solutions: https://thehackernews.com/2024/04/10-critical-endpoint-security-tips-you.html
👍13🔥6⚡1
Multiple severe vulnerabilities discovered in Brocade SANnav SAN management application.
From insecure root access to lack of authentication and encryption, one flaw even allows unauthenticated remote attackers to log in as root!
Read: https://thehackernews.com/2024/04/severe-flaws-disclosed-in-brocade.html
From insecure root access to lack of authentication and encryption, one flaw even allows unauthenticated remote attackers to log in as root!
Read: https://thehackernews.com/2024/04/severe-flaws-disclosed-in-brocade.html
👍18⚡1
🚨 Developers Beware! A new social engineering scam is on the rise, luring software engineers with fake job interviews only to infect their systems with BeaverTail and InvisibleFerret backdoors malware.
https://thehackernews.com/2024/04/bogus-npm-packages-used-to-trick.html
https://thehackernews.com/2024/04/bogus-npm-packages-used-to-trick.html
🤔25👍12🔥11😁3⚡1👏1
Cybersecurity researchers have uncovered a targeted cyber attack against Ukraine that leveraged a 7-year-old Microsoft Office flaw to deploy Cobalt Strike beacons on victims' systems.
Read: https://thehackernews.com/2024/04/ukraine-targeted-in-cyberattack.html
Read: https://thehackernews.com/2024/04/ukraine-targeted-in-cyberattack.html
🤔8⚡5🔥4👍3😁2
Heads up! Okta is sounding the alarm on an unprecedented spike in credential stuffing attacks targeting online services.
These attacks are powered by readily available tools and stolen credentials.
Details: https://thehackernews.com/2024/04/okta-warns-of-unprecedented-surge-in.html
These attacks are powered by readily available tools and stolen credentials.
Details: https://thehackernews.com/2024/04/okta-warns-of-unprecedented-surge-in.html
👍15⚡8😁2🔥1
🚨 Multiple vulnerabilities have been discovered in the popular Judge0 online code execution system, putting users at risk of complete system compromise.
Get the details: https://thehackernews.com/2024/04/sandbox-escape-vulnerabilities-in.html
Get the details: https://thehackernews.com/2024/04/sandbox-escape-vulnerabilities-in.html
👍13⚡3🔥1
Learn how Exposure Management empowers organizations to prioritize the most critical exposures based on their potential impact and proactively strengthen cybersecurity posture.
Read the full article to discover the power of Exposure Management ➡️ https://thehackernews.com/2024/04/navigating-threat-landscape.html
Read the full article to discover the power of Exposure Management ➡️ https://thehackernews.com/2024/04/navigating-threat-landscape.html
👍14
👨💻🔐 A new security vulnerability (CVE-2024-27322) has been discovered in the R programming language. It could allow attackers to execute arbitrary code through malicious RDS files, exposing your projects to supply chain attacks.
Read: https://thehackernews.com/2024/04/new-r-programming-vulnerability-exposes.html
Read: https://thehackernews.com/2024/04/new-r-programming-vulnerability-exposes.html
🔥20👍11⚡2
🚨 NEW THREAT ALERT!
Cybersecurity researchers have uncovered "Muddling Meerkat" - a sophisticated Chinese threat actor abusing DNS for global reconnaissance since 2019.
Details: https://thehackernews.com/2024/04/china-linked-muddling-meerkat-hijacks.html
Cybersecurity researchers have uncovered "Muddling Meerkat" - a sophisticated Chinese threat actor abusing DNS for global reconnaissance since 2019.
Details: https://thehackernews.com/2024/04/china-linked-muddling-meerkat-hijacks.html
🤯16👍8🤔4😁2⚡1
Just in! Google is tightening the screws on bad actors:
200K app submissions rejected
333K bad accounts blocked
2.28 million policy-violating apps prevented
31 SDKs impacting 790,000+ apps had data access limited
1.5 million outdated apps removed
https://thehackernews.com/2024/04/google-prevented-228-million-malicious.html
200K app submissions rejected
333K bad accounts blocked
2.28 million policy-violating apps prevented
31 SDKs impacting 790,000+ apps had data access limited
1.5 million outdated apps removed
https://thehackernews.com/2024/04/google-prevented-228-million-malicious.html
👏41👍30🤔8🔥3⚡2
🔒 Say goodbye to easily guessable passwords on your smart home devices!
The U.K.'s PSTI act prohibits DEFAULT PASSWORDS from April 2024 onwards. Manufacturers must up their security game or face hefty fines up to £10 MILLION.
Read: https://thehackernews.com/2024/04/new-uk-law-bans-default-passwords-on.html
The U.K.'s PSTI act prohibits DEFAULT PASSWORDS from April 2024 onwards. Manufacturers must up their security game or face hefty fines up to £10 MILLION.
Read: https://thehackernews.com/2024/04/new-uk-law-bans-default-passwords-on.html
👍13🔥13⚡6👏5😁2
🤖 U.S. government releases new AI security guidelines to protect critical systems like power grids and water treatment plants from AI threats.
Learn more: https://thehackernews.com/2024/04/us-government-releases-new-ai-security.html
Learn more: https://thehackernews.com/2024/04/us-government-releases-new-ai-security.html
👍17😁6🔥4⚡3👏2
🚨 MILLIONS of malicious "imageless" containers have been planted on Docker Hub over the past 5 years in multiple cybercriminal campaigns designed to phish users and deliver #malware payloads.
Get details here: https://thehackernews.com/2024/04/millions-of-malicious-imageless.html
Get details here: https://thehackernews.com/2024/04/millions-of-malicious-imageless.html
🤯28👍8⚡4😁3😱3👏1
Former NSA employee, Jareh Sebastian Dalke, has been sentenced to a nearly 22-year prison sentence for attempting to sell classified documents to Russia in exchange for $85,000.
Read: https://thehackernews.com/2024/05/ex-nsa-employee-sentenced-to-22-years.html
Read: https://thehackernews.com/2024/05/ex-nsa-employee-sentenced-to-22-years.html
😱29😁16👍8👏6🤔5🔥4🤯2⚡1
ZLoader, a dangerous malware, has resurfaced with an enhanced anti-analysis feature that prevents it from running on any machine other than the one initially infected.
Learn more about it: https://thehackernews.com/2024/05/zloader-malware-evolves-with-anti.html
Learn more about it: https://thehackernews.com/2024/05/zloader-malware-evolves-with-anti.html
👍16🔥11⚡2