π U.S. DoJ charges North Korean hacker Rim Jong Hyok for ransomware attacks on U.S. hospitals.
The attacks disrupted essential services & posed serious risks to patient care.
π° $10M reward announced for tips leading to the arrest of Hyok.
https://thehackernews.com/2024/07/us-doj-indicts-north-korean-hacker-for.html
The attacks disrupted essential services & posed serious risks to patient care.
π° $10M reward announced for tips leading to the arrest of Hyok.
https://thehackernews.com/2024/07/us-doj-indicts-north-korean-hacker-for.html
π10β‘6π6π±5π₯3π€1
New insights on application security testing highlight 6 essential methods.
These methods, including DAST & SAST, help identify vulnerabilities early and throughout the application lifecycle.
Learn more: https://thehackernews.com/2024/07/6-types-of-applications-security.html
These methods, including DAST & SAST, help identify vulnerabilities early and throughout the application lifecycle.
Learn more: https://thehackernews.com/2024/07/6-types-of-applications-security.html
π20π1
Cybersecurity expert Foster Nethercott highlights offensive AIβs potential as a major threat. Offensive AI can create novel malware capable of evading traditional security measures, posing significant risks.
His paper outlines key points: https://thehackernews.com/2024/07/offensive-ai-sine-qua-non-of.html
His paper outlines key points: https://thehackernews.com/2024/07/offensive-ai-sine-qua-non-of.html
π10π₯5π€5
A new phishing-as-a-service platform from the GXC Team targets Spanish banks and other institutions with malicious Android apps and AI-powered voice calling tools.
Learn more: https://thehackernews.com/2024/07/spanish-hackers-bundle-phishing-kits.html
Learn more: https://thehackernews.com/2024/07/spanish-hackers-bundle-phishing-kits.html
π₯14π7π€―4
Beware of the "lr-utils-lib" PyPI packageβit's a new threat to macOS users!
This package steals Google Cloud credentials, posing a serious risk to both individual developers and enterprises.
Read details: https://thehackernews.com/2024/07/malicious-pypi-package-targets-macos-to.html
This package steals Google Cloud credentials, posing a serious risk to both individual developers and enterprises.
Read details: https://thehackernews.com/2024/07/malicious-pypi-package-targets-macos-to.html
π21π7β‘2
French authorities and Europol launch "disinfection operation" against PlugX malware.
This operation aims to clean infected systems across multiple European countries, potentially affecting millions worldwide.
PlugX can persist on air-gapped networks and USB drives, posing a long-term risk.
Learn more: https://thehackernews.com/2024/07/french-authorities-launch-operation-to.html
This operation aims to clean infected systems across multiple European countries, potentially affecting millions worldwide.
PlugX can persist on air-gapped networks and USB drives, posing a long-term risk.
Learn more: https://thehackernews.com/2024/07/french-authorities-launch-operation-to.html
π30π10β‘3
Gh0st RAT malware is being delivered via the Gh0stGambit dropper, targeting Chinese-speaking Windows users through fake Chrome installers.
The malware can steal data, log keystrokes, and even enable remote access.
Read: https://thehackernews.com/2024/07/gh0st-rat-trojan-targets-chinese.html
The malware can steal data, log keystrokes, and even enable remote access.
Read: https://thehackernews.com/2024/07/gh0st-rat-trojan-targets-chinese.html
π±13π7β‘6π5
The threat actor Stargazer Goblin has created a network of over 3,000 fake GitHub accounts to distribute malware, netting $100,000 in illicit profits.
Read details here: https://thehackernews.com/2024/07/stargazer-goblin-creates-3000-fake.html
Read details here: https://thehackernews.com/2024/07/stargazer-goblin-creates-3000-fake.html
π₯11π±9π7π2β‘1
Searchable encryption is emerging as a new gold standard in data security.
This breakthrough technology enables data to be encrypted while still being used, eliminating flaws during data processing.
Discover the power of searchable encryption: https://thehackernews.com/2024/07/how-searchable-encryption-changes-data.html
This breakthrough technology enables data to be encrypted while still being used, eliminating flaws during data processing.
Discover the power of searchable encryption: https://thehackernews.com/2024/07/how-searchable-encryption-changes-data.html
π€―13π10π6π€6β‘4π3
Acronis warns of a critical security flaw in its Cyber Infrastructure (ACI) product. This vulnerability, CVE-2023-45249, allows RCE due to default passwords, posing a high risk (CVSS score: 9.8)
Read: https://thehackernews.com/2024/07/critical-flaw-in-acronis-cyber.html
Ensure your ACI is up-to-date.
Read: https://thehackernews.com/2024/07/critical-flaw-in-acronis-cyber.html
Ensure your ACI is up-to-date.
π12β‘6π4π€3π2
A vulnerability in VMware ESXi hypervisors has been exploited by ransomware groups to gain administrative access and deploy malware.
It allows attackers to escalate privileges easily, posing a severe risk to organizations using ESXi.
https://thehackernews.com/2024/07/vmware-esxi-flaw-exploited-by.html
It allows attackers to escalate privileges easily, posing a severe risk to organizations using ESXi.
https://thehackernews.com/2024/07/vmware-esxi-flaw-exploited-by.html
π€―21π15π±6π5
Alert: A new phishing campaign, called OneDrive Pastejacking, uses an HTML file mimicking a Microsoft OneDrive error message to trick users into running a malicious PowerShell script.
Details here: https://thehackernews.com/2024/07/onedrive-phishing-scam-tricks-users.html
Details here: https://thehackernews.com/2024/07/onedrive-phishing-scam-tricks-users.html
π₯11π8β‘6π±2
SideWinder, a nation-state threat actor, targets maritime facilities in the Indian Ocean and Mediterranean Sea.
This campaign could disrupt international maritime operations and compromise sensitive data.
Learn more: https://thehackernews.com/2024/07/new-sidewinder-cyber-attacks-target.html
This campaign could disrupt international maritime operations and compromise sensitive data.
Learn more: https://thehackernews.com/2024/07/new-sidewinder-cyber-attacks-target.html
π8β‘7π±3
Widespread phishing campaigns in Poland lead to the deployment of malware families like Agent Tesla and Formbook.
Attackers use compromised email accounts and company servers to spread malware and collect stolen data.
Read: https://thehackernews.com/2024/07/cybercriminals-target-polish-businesses.html
Attackers use compromised email accounts and company servers to spread malware and collect stolen data.
Read: https://thehackernews.com/2024/07/cybercriminals-target-polish-businesses.html
π9π₯7π3
Cybersixgillβs "State of the Underground 2024" report reveals the latest trends in the dark web. Understanding these trends is crucial for anticipating and mitigating cyber threats.
The report covers compromised credit card trends, initial access trends, and ransomware tactics used by threat actors.
Read: https://thehackernews.com/2024/07/cyber-threat-intelligence-illuminating.html
The report covers compromised credit card trends, initial access trends, and ransomware tactics used by threat actors.
Read: https://thehackernews.com/2024/07/cyber-threat-intelligence-illuminating.html
π₯8π7π€2
New Mandrake Android spyware found in five Google Play Store apps, undetected for two years.
This spyware compromised over 32,000 devices across multiple countries, showcasing the evolving threat landscape.
Learn more: https://thehackernews.com/2024/07/new-mandrake-spyware-found-in-google.html
This spyware compromised over 32,000 devices across multiple countries, showcasing the evolving threat landscape.
Learn more: https://thehackernews.com/2024/07/new-mandrake-spyware-found-in-google.html
π±21π10π₯6π2π2
RMM tools are being weaponized by cybercriminals to infiltrate networks. As remote work increases, RMM tools, if exploited, can lead to severe data breaches and undetected malicious activities.
Ransomware-as-a-service groups often use legitimate IT tools to navigate networks stealthily and steal data.
Implementing robust application control policies can mitigate these risks significantly.
Read about it here: https://thehackernews.com/2024/07/the-power-and-peril-of-rmm-tools.html
Ransomware-as-a-service groups often use legitimate IT tools to navigate networks stealthily and steal data.
Implementing robust application control policies can mitigate these risks significantly.
Read about it here: https://thehackernews.com/2024/07/the-power-and-peril-of-rmm-tools.html
π12π₯9
Meta settles for $1.4 billion with Texas over illegal biometric data collection. The lawsuit accused Meta of capturing facial data without users' consent, violating Texas law.
Learn more: https://thehackernews.com/2024/07/meta-settles-for-14-billion-with-texas.html
Learn more: https://thehackernews.com/2024/07/meta-settles-for-14-billion-with-texas.html
π37π7π₯6π2π±1
Companies in Russia and Moldova have been targeted by a phishing campaign from the cyber espionage group XDSpy.
XDSpy uses sophisticated spear-phishing techniques to deploy malware, which can exfiltrate data and gather passwords.
Read: https://thehackernews.com/2024/07/cyber-espionage-group-xdspy-targets.html
XDSpy uses sophisticated spear-phishing techniques to deploy malware, which can exfiltrate data and gather passwords.
Read: https://thehackernews.com/2024/07/cyber-espionage-group-xdspy-targets.html
π10π€―9
π¨ A large-scale Android malware campaign targeting 600+ global brands and millions of users has been uncovered.
Over 107,000 malicious apps, mostly outside known repositories, are stealing SMS messages and OTPs for identity fraud.
Learn more: https://thehackernews.com/2024/07/cybercriminals-deploy-100k-malware.html
Over 107,000 malicious apps, mostly outside known repositories, are stealing SMS messages and OTPs for identity fraud.
Learn more: https://thehackernews.com/2024/07/cybercriminals-deploy-100k-malware.html
π8π₯7π±5