FreshRSS

🔒
❌ À propos de FreshRSS
Il y a de nouveaux articles disponibles, cliquez pour rafraîchir la page.
☐ ☆ ✇ The Hacker News

Fronton: Russian IoT Botnet Designed to Run Social Media Disinformation Campaigns

Par : [email protected] (Ravie Lakshmanan)
Fronton, a distributed denial-of-service (DDoS) botnet that came to light in March 2020, is much more powerful than previously thought, per the latest research. "Fronton is a system developed for coordinated inauthentic behavior on a massive scale," threat intelligence firm Nisos said in a report published last week. "This system includes a web-based dashboard known as SANA that enables a user
☐ ☆ ✇ The Hacker News

New Unpatched Bug Could Let Attackers Steal Money from PayPal Users

Par : [email protected] (Ravie Lakshmanan)
A security researcher claims to have discovered an unpatched vulnerability in PayPal's money transfer service that could allow attackers to trick victims into unknowingly completing attacker-directed transactions with a single click. Clickjacking, also called UI redressing, refers to a technique wherein an unwitting user is tricked into clicking seemingly innocuous webpage elements like buttons
☐ ☆ ✇ The Hacker News

Chinese "Twisted Panda" Hackers Caught Spying on Russian Defense Institutes

Par : [email protected] (Ravie Lakshmanan)
At least two research institutes located in Russia and a third likely target in Belarus have been at the receiving end of an espionage attack by a Chinese nation-state advanced persistent threat (APT). The attacks, codenamed "Twisted Panda," come in the backdrop of Russia's military invasion of Ukraine, prompting a wide range of threat actors to swiftly adapt their campaigns on the ongoing
☐ ☆ ✇ The Hacker News

Researchers Find Backdoor in School Management Plugin for WordPress

Par : [email protected] (Ravie Lakshmanan)
Multiple versions of a WordPress plugin by the name of "School Management Pro" harbored a backdoor that could grant an adversary complete control over vulnerable websites. The issue, spotted in premium versions before 9.9.7, has been assigned the CVE identifier CVE-2022-1609 and is rated 10 out of 10 for severity. The backdoor, which is believed to have existed since version 8.9, enables "an
☐ ☆ ✇ The Hacker News

Cisco Issues Patch for New IOS XR Zero-Day Vulnerability Exploited in the Wild

Par : [email protected] (Ravie Lakshmanan)
Cisco on Friday rolled out fixes for a medium-severity vulnerability affecting IOS XR Software that it said has been exploited in real-world attacks. Tracked as CVE-2022-20821 (CVSS score: 6.5), the issue relates to an open port vulnerability that could be abused by an unauthenticated, remote attacker to connect to a Redis instance and achieve code execution. "A successful exploit could allow
☐ ☆ ✇ The Hacker News

Microsoft Warns Rise in XorDdos Malware Targeting Linux Devices

Par : [email protected] (Ravie Lakshmanan)
A Linux botnet malware known as XorDdos has witnessed a 254% surge in activity over the last six months, according to latest research from Microsoft. The trojan, so named for carrying out denial-of-service attacks on Linux systems and its use of XOR-based encryption for communications with its command-and-control (C2) server, is known to have been active since at least 2014. "XorDdos' modular
☐ ☆ ✇ The Hacker News

Cytrox's Predator Spyware Targeted Android Users with Zero-Day Exploits

Par : [email protected] (Ravie Lakshmanan)
Google's Threat Analysis Group (TAG) on Thursday pointed fingers at a North Macedonian spyware developer named Cytrox for developing exploits against five zero-day (aka 0-day) flaws, four in Chrome and one in Android, to target Android users. "The 0-day exploits were used alongside n-day exploits as the developers took advantage of the time difference between when some critical bugs were patched
☐ ☆ ✇ The Hacker News

Researchers Uncover Rust Supply Chain Attack Targeting Cloud CI Pipelines

Par : [email protected] (Ravie Lakshmanan)
A case of software supply chain attack has been observed in the Rust programming language's crate registry that leveraged typosquatting techniques to publish a rogue library containing malware. Cybersecurity firm SentinelOne dubbed the attack "CrateDepression." Typosquatting attacks take place when an adversary mimics the name of a popular package on a public registry in hopes that developers
☐ ☆ ✇ The Hacker News

Hackers Exploiting VMware Horizon to Target South Korea with NukeSped Backdoor

Par : [email protected] (Ravie Lakshmanan)
The North Korea-backed Lazarus Group has been observed leveraging the Log4Shell vulnerability in VMware Horizon servers to deploy the NukeSped (aka Manuscrypt) implant against targets located in its southern counterpart. "The attacker used the Log4j vulnerability on VMware Horizon products that were not applied with the security patch," AhnLab Security Emergency Response Center (ASEC) said in a
☐ ☆ ✇ The Hacker News

Hackers Trick Users with Fake Windows 11 Downloads to Distribute Vidar Malware

Par : [email protected] (Ravie Lakshmanan)
Fraudulent domains masquerading as Microsoft's Windows 11 download portal are attempting to trick users into deploying trojanized installation files to infect systems with the Vidar information stealer malware. "The spoofed sites were created to distribute malicious ISO files which lead to a Vidar info-stealer infection on the endpoint," Zscaler said in a report. "These variants of Vidar malware
☐ ☆ ✇ The Hacker News

QNAP Urges Users to Update NAS Devices to Prevent Deadbolt Ransomware Attacks

Par : [email protected] (Ravie Lakshmanan)
Taiwanese network-attached storage (NAS) devices maker QNAP on Thursday warned its customers of a fresh wave of DeadBolt ransomware attacks. The intrusions are said to have targeted TS-x51 series and TS-x53 series appliances running on QTS 4.3.6 and QTS 4.4.1, according to its product security incident response team.  "QNAP urges all NAS users to check and update QTS to the latest version as
☐ ☆ ✇ The Hacker News

New Bluetooth Hack Could Let Attackers Remotely Unlock Smart Locks and Cars

Par : [email protected] (Ravie Lakshmanan)
A novel Bluetooth relay attack can let cybercriminals more easily than ever remotely unlock and operate cars, break open residential smart locks, and breach secure areas. The vulnerability has to do with weaknesses in the current implementation of Bluetooth Low Energy (BLE), a wireless technology used for authenticating Bluetooth devices that are physically located within a close range. <!-
☐ ☆ ✇ The Hacker News

7 Key Findings from the 2022 SaaS Security Survey Report

Par : [email protected] (The Hacker News)
The 2022 SaaS Security Survey Report, in collaboration with CSA, examines the state of SaaS security as seen in the eyes of CISOs and security professionals in today's enterprises. The report gathers anonymous responses from 340 CSA members to examine not only the growing risks in SaaS security but also how different organizations are currently working to secure themselves. Demographics The
☐ ☆ ✇ The Hacker News

High-Severity Bug Reported in Google's OAuth Client Library for Java

Par : [email protected] (Ravie Lakshmanan)
Google last month addressed a high-severity flaw in its OAuth client library for Java that could be abused by a malicious actor with a compromised token to deploy arbitrary payloads. Tracked as CVE-2021-22573, the vulnerability is rated 8.7 out of 10 for severity and relates to an authentication bypass in the library that stems from an improper verification of the cryptographic signature.
☐ ☆ ✇ The Hacker News

Web Trackers Caught Intercepting Online Forms Even Before Users Hit Submit

Par : [email protected] (Ravie Lakshmanan)
A new research published by academics from KU Leuven, Radboud University, and the University of Lausanne has revealed that users' email addresses are exfiltrated to tracking, marketing, and analytics domains before such information is submitted and without prior consent. The study involved crawling 2.8 million pages from the top 100 websites, and found that as many as 1,844 websites allowed
☐ ☆ ✇ The Hacker News

VMware Releases Patches for New Vulnerabilities Affecting Multiple Products

Par : [email protected] (Ravie Lakshmanan)
VMware has issued patches to contain two security flaws impacting Workspace ONE Access, Identity Manager, and vRealize Automation that could be exploited to backdoor enterprise networks. The first of the two flaws, tracked as CVE-2022-22972 (CVSS score: 9.8), concerns an authentication bypass that could enable an actor with network access to the UI to gain administrative access without prior
☐ ☆ ✇ The Hacker News

How to Protect Your Data When Ransomware Strikes

Par : [email protected] (The Hacker News)
Ransomware is not a new attack vector. In fact, the first malware of its kind appeared more than 30 years ago and was distributed via 5.25-inch floppy disks. To pay the ransom, the victim had to mail money to a P.O. Box in Panama. Fast forward to today, affordable ransomware-as-a-service (RaaS) kits are available on the dark web for anyone to purchase and deploy and attackers have an infinite
☐ ☆ ✇ The Hacker News

Researchers Expose Inner Workings of Billion-Dollar Wizard Spider Cybercrime Gang

Par : [email protected] (Ravie Lakshmanan)
The inner workings of a cybercriminal group known as the Wizard Spider have been exposed, shedding light on its organizational structure and motivations. "Most of Wizard Spider's efforts go into hacking European and U.S. businesses, with a special cracking tool used by some of their attackers to breach high-value targets," Swiss cybersecurity company PRODAFT said in a new report shared with The
☐ ☆ ✇ The Hacker News

[eBook] Your 90-Day MSSP Plan: How to Improve Margins and Scale-Up Service Delivery

Par : [email protected] (The Hacker News)
To cash in on a thriving market, a managed security service provider (MSSP) must navigate unprecedented competition and complex challenges. The good news is that demand is through the roof. 69% of organizations plan to boost spending on cybersecurity in 2022.  The bad news is that everyone wants a piece of the pie. MSSPs must outshine each other while fending off encroachments by traditional IT
❌