FreshRSS

🔒
❌ À propos de FreshRSS
Il y a de nouveaux articles disponibles, cliquez pour rafraîchir la page.
☐ ☆ ✇ The Hacker News

Critical 'Pantsdown' BMC Vulnerability Affects QCT Servers Used in Data Centers

Par : [email protected] (Ravie Lakshmanan)
Quanta Cloud Technology (QCT) servers have been identified as vulnerable to the severe "Pantsdown" Baseboard Management Controller (BMC) flaw, according to new research published today. "An attacker running code on a vulnerable QCT server would be able to 'hop' from the server host to the BMC and move their attacks to the server management network, possibly continue and obtain further
☐ ☆ ✇ The Hacker News

Experts Warn of Rise in ChromeLoader Malware Hijacking Users' Browsers

Par : [email protected] (Ravie Lakshmanan)
A malvertising threat is witnessing a new surge in activity since its emergence earlier this year. Dubbed ChromeLoader, the malware is a "pervasive and persistent browser hijacker that modifies its victims' browser settings and redirects user traffic to advertisement websites," Aedan Russell of Red Canary said in a new report. ChromeLoader is a rogue Chrome browser extension and is typically
☐ ☆ ✇ The Hacker News

Hackers Increasingly Using Browser Automation Frameworks for Malicious Activities

Par : [email protected] (Ravie Lakshmanan)
Cybersecurity researchers are calling attention to a free-to-use browser automation framework that's being increasingly used by threat actors as part of their attack campaigns. "The framework contains numerous features which we assess may be utilized in the enablement of malicious activities," researchers from Team Cymru said in a new report published Wednesday. "The technical entry bar for the
☐ ☆ ✇ The Hacker News

The Added Dangers Privileged Accounts Pose to Your Active Directory

Par : [email protected] (The Hacker News)
In any organization, there are certain accounts that are designated as being privileged. These privileged accounts differ from standard user accounts in that they have permission to perform actions that go beyond what standard users can do. The actions vary based on the nature of the account but can include anything from setting up new user accounts to shutting down mission-critical systems.
☐ ☆ ✇ The Hacker News

Tails OS Users Advised Not to Use Tor Browser Until Critical Firefox Bugs are Patched

Par : [email protected] (Ravie Lakshmanan)
The maintainers of the Tails project have issued a warning that the Tor Browser that's bundled with the operating system is unsafe to use for accessing or entering sensitive information. "We recommend that you stop using Tails until the release of 5.1 (May 31) if you use Tor Browser for sensitive information (passwords, private messages, personal information, etc.)," the project said in an
☐ ☆ ✇ The Hacker News

Twitter Fined $150 Million for Misusing Users' Data for Advertising Without Consent

Par : [email protected] (Ravie Lakshmanan)
Twitter, which is in the process of being acquired by Tesla CEO Elon Musk, has agreed to pay $150 million to the U.S. Federal Trade Commission (FTC) to settle allegations that it abused non-public information collected for security purposes to serve targeted ads. In addition to the monetary penalty for "misrepresenting its privacy and security practices," the company has been banned from
☐ ☆ ✇ The Hacker News

Interpol Arrests Leader of SilverTerrier Cybercrime Gang Behind BEC Attacks

Par : [email protected] (Ravie Lakshmanan)
A year-long international investigation has resulted in the arrest of the suspected head of the SilverTerrier cybercrime group by the Nigeria Police Force. "The suspect is alleged to have run a transnational cybercrime syndicate that launched mass phishing campaigns and business email compromise schemes targeting companies and individual victims," Interpol said in a statement. <!--adsense-->
☐ ☆ ✇ The Hacker News

Lumos System Can Find Hidden Cameras and IoT Devices in Your Airbnb or Hotel Room

Par : [email protected] (Ravie Lakshmanan)
A group of academics has devised a system that can be used on a phone or a laptop to identify and locate Wi-Fi-connected hidden IoT devices in unfamiliar physical spaces. With hidden cameras being increasingly used to snoop on individuals in hotel rooms and Airbnbs, the goal is to be able to pinpoint such rogue devices without much of a hassle. The system, dubbed Lumos, is designed with this
☐ ☆ ✇ The Hacker News

How Secrets Lurking in Source Code Lead to Major Breaches

Par : [email protected] (The Hacker News)
If one word could sum up the 2021 infosecurity year (well, actually three), it would be these: "supply chain attack".  A software supply chain attack happens when hackers manipulate the code in third-party software components to compromise the 'downstream' applications that use them. In 2021, we have seen a dramatic rise in such attacks: high profile security incidents like the SolarWinds,
☐ ☆ ✇ The Hacker News

Learn How Hackers Can Hijack Your Online Accounts Even Before You Create Them

Par : [email protected] (Ravie Lakshmanan)
Malicious actors can gain unauthorized access to users' online accounts via a new technique called "account pre-hijacking," new research has found. The attack takes aim at the account creation process that's ubiquitous in websites and other online platforms, enabling an adversary to perform a set of actions before an unsuspecting victim creates an account in a target service. The study was led
☐ ☆ ✇ The Hacker News

Researchers Find New Malware Attacks Targeting Russian Government Entities

Par : [email protected] (Ravie Lakshmanan)
An unknown advanced persistent threat (APT) group has been linked to a series of spear-phishing attacks targeting Russian government entities since the onset of the Russo-Ukrainian war in late February 2022. "The campaigns [...] are designed to implant a Remote Access Trojan (RAT) that can be used to surveil the computers it infects, and run commands on them remotely," Malwarebytes said in a
☐ ☆ ✇ The Hacker News

[Template] Incident Response for Management Presentation

Par : [email protected] (The Hacker News)
Security incidents occur. It's not a matter of "if," but of "when." That's why you implemented security products and procedures to optimize the incident response (IR) process. However, many security pros who are doing an excellent job in handling incidents find effectively communicating the ongoing process with their management a much more challenging task. Feels familiar? In many organizations,
☐ ☆ ✇ The Hacker News

New Zoom Flaws Could Let Attackers Hack Victims Just by Sending them a Message

Par : [email protected] (Ravie Lakshmanan)
Popular video conferencing service Zoom has resolved as many as four security vulnerabilities, which could be exploited to compromise another user over chat by sending specially crafted Extensible Messaging and Presence Protocol (XMPP) messages and execute malicious code. Tracked from CVE-2022-22784 through CVE-2022-22787, the issues range between 5.9 and 8.1 in severity. Ivan Fratric of Google
☐ ☆ ✇ The Hacker News

Popular PyPI Package 'ctx' and PHP Library 'phpass' Hijacked to Steal AWS Keys

Par : [email protected] (Ravie Lakshmanan)
Two trojanized Python and PHP packages have been uncovered in what's yet another instance of a software supply chain attack targeting the open source ecosystem. One of the packages in question is "ctx," a Python module available in the PyPi repository. The other involves "phpass," a PHP package that's been forked on GitHub to distribute a rogue update. "In both cases the attacker appears to have
☐ ☆ ✇ The Hacker News

SIM-based Authentication Aims to Transform Device Binding Security to End Phishing

Par : [email protected] (The Hacker News)
Let's face it: we all use email, and we all use passwords. Passwords create inherent vulnerability in the system. The success rate of phishing attacks is skyrocketing, and opportunities for the attack have greatly multiplied as lives moved online. All it takes is one password to be compromised for all other users to become victims of a data breach.  To deliver additional security, therefore,
☐ ☆ ✇ The Hacker News

New Chaos Ransomware Builder Variant "Yashma" Discovered in the Wild

Par : [email protected] (Ravie Lakshmanan)
Cybersecurity researchers have disclosed details of the latest version of the Chaos ransomware line, dubbed Yashma. "Though Chaos ransomware builder has only been in the wild for a year, Yashma claims to be the sixth version (v6.0) of this malware," BlackBerry research and intelligence team said in a report shared with The Hacker News. Chaos is a customizable ransomware builder that emerged in
☐ ☆ ✇ The Hacker News

Malware Analysis: Trickbot

Par : [email protected] (The Hacker News)
In this day and age, we are not dealing with roughly pieced together, homebrew type of viruses anymore. Malware is an industry, and professional developers are found to exchange, be it by stealing one's code or deliberate collaboration. Attacks are multi-layer these days, with diverse sophisticated software apps taking over different jobs along the attack-chain from initial compromise to
☐ ☆ ✇ The Hacker News

Conti Ransomware Operation Shut Down After Splitting into Smaller Groups

Par : [email protected] (Ravie Lakshmanan)
Even as the operators of Conti threatened to overthrow the Costa Rican government, the notorious cybercrime gang officially took down its attack infrastructure in favor of migrating their malicious cyber activities to other ancillary operations, including Karakurt and BlackByte. "From the negotiations site, chatrooms, messengers to servers and proxy hosts - the Conti brand, not the organization
☐ ☆ ✇ The Hacker News

Microsoft Warns of Web Skimmers Mimicking Google Analytics and Meta Pixel Code

Par : [email protected] (Ravie Lakshmanan)
Threat actors behind web skimming campaigns are leveraging malicious JavaScript code that mimics Google Analytics and Meta Pixel scripts in an attempt to sidestep detection. "It's a shift from earlier tactics where attackers conspicuously injected malicious scripts into e-commerce platforms and content management systems (CMSs) via vulnerability exploitation, making this threat highly evasive to
❌