Translate

Tuesday, 30 November 2021

Twitter Bans Users From Posting ‘Private Media’ Without a Person's Consent

Twitter on Tuesday announced an expansion to its private information policy to include private media, effectively prohibiting the sharing of photos and videos without express permission from the individuals depicted in them with an aim to curb doxxing and harassment. "Beginning today, we will not allow the sharing of private media, such as images or videos of private individuals without their

Multiple Vulnerabilities Spotted In Zoom Video Conferencing App

Researchers from Google Project Zero have discovered numerous vulnerabilities in the Zoom app that could…

Multiple Vulnerabilities Spotted In Zoom Video Conferencing App on Latest Hacking News.



New TrickBot Phishing Technique Checks Device Screen Resolution To Evade Detection

The infamous TrickBot malware has now adopted another evasive feature to escape security checks. As…

New TrickBot Phishing Technique Checks Device Screen Resolution To Evade Detection on Latest Hacking News.



T-Reqs – A Tool For HTTP Request Smuggling (HRS) attacks

A team of academic researchers have developed a new HTTP fuzzing tool called ‘T-Reqs’. This…

T-Reqs – A Tool For HTTP Request Smuggling (HRS) attacks on Latest Hacking News.



Zoom Launches Auto-Update Feature For Windows And Mac Clients

The popular communication platform Zoom continues improving its features as it increases its userbase. Recently,…

Zoom Launches Auto-Update Feature For Windows And Mac Clients on Latest Hacking News.



New Hub for Lean IT Security Teams

One of the harsh realities of cybersecurity today is that malicious actors and attackers don’t distinguish between organizations that have seemingly endless resources and those operating with lean IT security teams. For these lean teams, meeting the challenges in the current security landscape requires constant attention, and sometimes a little support. XDR provider Cynet has built a new

Critical Wormable Security Flaw Found in Several HP Printer Models

Cybersecurity researchers on Tuesday disclosed multiple security flaws affecting 150 different multifunction printers (MFPs) from HP Inc that could be potentially abused by an adversary to take control of vulnerable devices, pilfer sensitive information, and infiltrate enterprise networks to mount other attacks. The two weaknesses — collectively called Printing Shellz — were discovered and

Panasonic Suffers Data Breach After Hackers Hack Into Its Network

Japanese consumer electronics giant Panasonic has disclosed a security breach wherein an unauthorized third-party broke into its network and potentially accessed data from one of its file servers. "As the result of an internal investigation, it was determined that some data on a file server had been accessed during the intrusion," the company said in a short statement published on November 26.

Unpatched Unauthorized File Read Vulnerability Affects Microsoft Windows OS

Unofficial patches have been issued to remediate an improperly patched Windows security vulnerability that could allow information disclosure and local privilege escalation (LPE) on vulnerable systems. Tracked as CVE-2021-24084 (CVSS score: 5.5), the flaw concerns an information disclosure vulnerability in the Windows Mobile Device Management component that could enable an attacker to gain

WIRTE Hacker Group Targets Government, Law, Financial Entities in Middle East

Government, diplomatic entities, military organizations, law firms, and financial institutions primarily located in the Middle East have been targeted as part of a stealthy malware campaign as early as 2019 by making use of malicious Microsoft Excel and Word documents. Russian cybersecurity company Kaspersky attributed the attacks with high confidence to a threat actor named WIRTE, adding the

Monday, 29 November 2021

More than 1,000 arrested in global crackdown on online fraud

The INTERPOL-led operation involved law enforcement from 20 countries and led to the seizure of millions of dollars in illicit gains

The post More than 1,000 arrested in global crackdown on online fraud appeared first on WeLiveSecurity



4 Android Banking Trojan Campaigns Targeted Over 300,000 Devices in 2021

Four different Android banking trojans were spread via the official Google Play Store between August and November 2021, resulting in more than 300,000 infections through various dropper apps that posed as seemingly harmless utility apps to take full control of the infected devices. Designed to deliver Anatsa (aka TeaBot), Alien, ERMAC, and Hydra, cybersecurity firm ThreatFabric said the malware

CronRAT Linux Malware Abuses A Non-Standard Date To Evade Detection

Newly discovered Linux malware, CronRAT, has gained attention as it paves the way for Magecart…

CronRAT Linux Malware Abuses A Non-Standard Date To Evade Detection on Latest Hacking News.



Threat Actors Used Tardigrade Malware In Attacks On Biomanufacturing Firms

Reportedly, a new malware, identified as “Tardigrade,” is actively targeting the biomanufacturing sector. The threat…

Threat Actors Used Tardigrade Malware In Attacks On Biomanufacturing Firms on Latest Hacking News.



EdbMails Review

Table content Key Takeaway points EdbMails EDB to PST converter: Main Features EdbMails: Other beneficial…

EdbMails Review on Latest Hacking News.



New Chinotto Spyware Targets North Korean Defectors, Human Rights Activists

North Korean defectors, journalists who cover North Korea-related news, and entities in South Korea are being zeroed in on by a nation-state-sponsored advanced persistent threat (APT) as part of a new wave of highly-targeted surveillance attacks. Russian cybersecurity firm Kaspersky attributed the infiltrations to a North Korean hacker group tracked as ScarCruft, also known as APT37, Reaper

CleanMyMac X: Performance and Security Software for Macbook

We use Internet-enabled devices in every aspect of our lives today—to find information, shop, bank, do homework, play games, and keep in touch with friends and family. As a result, our devices contain much personal information about us. Also, any great device will get a little clunky and slow over time and the Mac is no exception, and the whole "Macs don't get viruses" claim is a myth. Malware

New RATDispenser JavaScript Loader Delivers Infostealers To Pilfer Passwords

A new malware loader is active in the wild, targeting users with RATs and infostealers.…

New RATDispenser JavaScript Loader Delivers Infostealers To Pilfer Passwords on Latest Hacking News.



Hackers Using Compromised Google Cloud Accounts to Mine Cryptocurrency

Threat actors are exploiting improperly-secured Google Cloud Platform (GCP) instances to download cryptocurrency mining software to the compromised systems as well as abusing its infrastructure to install ransomware, stage phishing campaigns, and even generate traffic to YouTube videos for view count manipulation. "While cloud customers continue to face a variety of threats across applications

Interpol Arrests Over 1,000 Cyber Criminals From 20 Countries; Seizes $27 Million

A joint four-month operation coordinated by Interpol, the international criminal police organization, has culminated in the arrests of more than 1,000 cybercriminals and the recovery of $27 million in illicit proceeds. Codenamed "HAECHI-II," the crackdown enabled law enforcement units from across 20 countries, as well as Hong Kong and Macao, close 1,660 cases alongside blocking 2,350 bank

Saturday, 27 November 2021

Week in security with Tony Anscombe

How scammers take advantage of supply chain shortages – Tips for safe online shopping this holiday season – Steps to take after receiving a data breach notice

The post Week in security with Tony Anscombe appeared first on WeLiveSecurity



Multiple Vulnerabilities Spotted In Hide My WP WordPress Plugin

Numerous vulnerabilities in Hide My WP plugin WordPress plugin could pose serious security risks to…

Multiple Vulnerabilities Spotted In Hide My WP WordPress Plugin on Latest Hacking News.



Friday, 26 November 2021

Italy's Antitrust Regulator Fines Google and Apple for "Aggressive" Data Practices

Italy's antitrust regulator has fined both Apple and Google €10 million each for what it calls are "aggressive" data practices and for not providing consumers with clear information on commercial uses of their personal data during the account creation phase. The Autorità Garante della Concorrenza e del Mercato (AGCM) said "Google and Apple did not provide clear and immediate information on the

How to get a deal on cybersecurity software

The world of digital technology has progressed across multiple sectors and with that a rise…

How to get a deal on cybersecurity software on Latest Hacking News.



Hackers Targeting Biomanufacturing Facilities With Tardigrade Malware

An advanced persistent threat (APT) has been linked to cyberattacks on two biomanufacturing companies that occurred this year with the help of a custom malware loader called "Tardigrade." That's according to an advisory published by Bioeconomy Information Sharing and Analysis Center (BIO-ISAC) this week, which noted that the malware is actively spreading across the sector with the likely goal of

Hacking Fingerprints With a $5 Setup To Bypass Biometric Authentication

Biometric authentication techniques have gained momentum over the past few years due to the inherent…

Hacking Fingerprints With a $5 Setup To Bypass Biometric Authentication on Latest Hacking News.



How to Secure Your New Motor Vehicle

People invest a good amount of money in their vehicles when they aim to start…

How to Secure Your New Motor Vehicle on Latest Hacking News.



Crypto Hackers Using Babadeda Crypter to Make Their Malware Undetectable

A new malware campaign has been discovered targeting cryptocurrency, non-fungible token (NFT), and DeFi aficionados through Discord channels to deploy a crypter named "Babadeda" that's capable of bypassing antivirus solutions and stage a variety of attacks. "[T]his malware installer has been used in a variety of recent campaigns to deliver information stealers, RATs, and even LockBit ransomware,

CronRAT: A New Linux Malware That’s Scheduled to Run on February 31st

Researchers have unearthed a new remote access trojan (RAT) for Linux that employs a never-before-seen stealth technique that involves masking its malicious actions by scheduling them for execution on February 31st, a non-existent calendar day. Dubbed CronRAT, the sneaky malware "enables server-side Magecart data theft which bypasses browser-based security solutions," Sansec Threat Research said

Thursday, 25 November 2021

Israel Bans Sales of Hacking and Surveillance Tools to 65 Countries

Israel's Ministry of Defense has dramatically restricted the number of countries to which cybersecurity firms in the country are allowed to sell offensive hacking and surveillance tools to, cutting off 65 nations from the export list. The revised list, details of which were first reported by the Israeli business newspaper Calcalist, now only includes 37 countries, down from the previous 102:

The triangle of holiday shopping: Scams, social media and supply chain woes

‘Tis the season to avoid getting played by scammers hijacking Twitter accounts and promoting fake offers for PlayStation 5 consoles and other red-hot products

The post The triangle of holiday shopping: Scams, social media and supply chain woes appeared first on WeLiveSecurity



Product Releases Should Not Be Scary

Every Product Manager and Software Developer should know that pushing feature updates to production via traditional channels is as archaic as painting on cave walls. The smart are always quick to adapt to new, innovative technologies, and this mindset is exactly what makes normal companies great. The landscape is changing fast, especially in IT. Change isn't just necessary, but more often than

Microsoft Silently Rolls Out “Super Duper Secure Mode” With Latest Edge Browser Versions

The Redmond giant has released the “Super Duper Secure Mode” for its Microsoft Edge browser…

Microsoft Silently Rolls Out “Super Duper Secure Mode” With Latest Edge Browser Versions on Latest Hacking News.



This New Stealthy JavaScript Loader Infecting Computers with Malware

Threat actors have been found using a previously undocumented JavaScript malware strain that functions as a loader to distribute an array of remote access Trojans (RATs) and information stealers. HP Threat Research dubbed the new, evasive loader "RATDispenser," with the malware responsible for deploying at least eight different malware families in 2021. Around 155 samples of this new malware

Hackers Using Microsoft MSHTML Flaw to Spy on Targeted PCs with Malware

A new Iranian threat actor has been discovered exploiting a now-addressed critical flaw in the Microsoft Windows MSHTML platform to target Farsi-speaking victims with a new PowerShell-based information stealer designed to harvest extensive details from infected machines. "[T]he stealer is a PowerShell script, short with powerful collection capabilities — in only ~150 lines, it provides the

If You're Not Using Antivirus Software, You're Not Paying Attention

Stop tempting fate and take a look at our picks for the best antivirus programs on the market today. Every year there are billions of malware attacks worldwide. And these threats are constantly evolving. So if you are not currently using antivirus software, or you still rely on some free software you downloaded back in 2017, you are putting your cybersecurity in serious jeopardy.  Need help

Warning — Hackers Exploiting New Windows Installer Zero-Day Exploit in the Wild

Attackers are actively making efforts to exploit a new variant of a recently disclosed privilege escalation vulnerability to potentially execute arbitrary code on fully-patched systems, once again demonstrating how adversaries move quickly to weaponize a publicly available exploit. Cisco Talos disclosed that it "detected malware samples in the wild that are attempting to take advantage of this

Wednesday, 24 November 2021

Avoiding the shopping blues: How to shop online safely this holiday season

With the holiday shopping bonanza right around the corner, here's how to make sure your online spending spree is hacker-free

The post Avoiding the shopping blues: How to shop online safely this holiday season appeared first on WeLiveSecurity



VMware Warns of Newly Discovered Vulnerabilities in vSphere Web Client

VMware has shipped updates to address two security vulnerabilities in vCenter Server and Cloud Foundation that could be abused by a remote attacker to gain access to sensitive information. The more severe of the issues concerns an arbitrary file read vulnerability in the vSphere Web Client. Tracked as CVE-2021-21980, the bug has been rated 7.5 out of a maximum of 10 on the CVSS scoring system,

Eavesdropping Bugs in MediaTek Chips Affect 37% of All Smartphones and IoT Globally

Multiple security weaknesses have been disclosed in MediaTek system-on-chips (SoCs) that could have enabled a threat actor to elevate privileges and execute arbitrary code in the firmware of the audio processor, effectively allowing the attackers to carry out a "massive eavesdrop campaign" without the users' knowledge. The discovery of the flaws is the result of reverse-engineering the Taiwanese

APT C-23 Hackers Using New Android Spyware Variant to Target Middle East Users

A threat actor known for striking targets in the Middle East has evolved its Android spyware yet again with enhanced capabilities that allow it to be stealthier and more persistent while passing off as seemingly innocuous app updates to stay under the radar. The new variants have "incorporated new features into their malicious apps that make them more resilient to actions by users, who might try

Webinar and eBook: The Dark Side of EDR. Are You Prepared?

Endpoint Detection and Response (EDR) platforms have received incredible attention as the platform for security teams. Whether you're evaluating an EDR for the first time or looking to replace your EDR, as an information security professional, you need to be aware of the gaps prior already to implementation so you can best prepare how to close the gaps. It's important to understand that each

Over 9 Million Android Phones Running Malware Apps from Huawei's AppGallery

At least 9.3 million Android devices have been infected by a new class of malware that disguises itself as dozens of arcade, shooter, and strategy games on Huawei's AppGallery marketplace to steal device information and victims' mobile phone numbers. The mobile campaign was disclosed by researchers from Doctor Web, who classified the trojan as "Android.Cynos.7.origin," owing to the fact that the

Tuesday, 23 November 2021

Apple Sues Israel's NSO Group for Spying on iPhone Users With Pegasus Spyware

Apple has sued NSO Group and its parent company Q Cyber Technologies in a U.S. federal court holding it accountable for illegally targeting users with its Pegasus surveillance tool, marking yet another setback for the Israeli spyware vendor. The Cupertino-based tech giant painted NSO Group as "notorious hackers — amoral 21st century mercenaries who have created highly sophisticated

FBI, CISA urge organizations to be on guard for attacks during holidays

Threat actors have previously timed ransomware and other attacks to coincide with holidays and weekends

The post FBI, CISA urge organizations to be on guard for attacks during holidays appeared first on WeLiveSecurity



LAPD – A New Method To Detect Spy Cameras Via Smartphone

A team of researchers has developed an effective strategy to detect spy cameras using a…

LAPD – A New Method To Detect Spy Cameras Via Smartphone on Latest Hacking News.



Drupal Release Patches for CKEditor XSS Bugs

Drupal has rolled out updates since cross-site scripting vulnerabilities were discovered within CKEditor. The developers…

Drupal Release Patches for CKEditor XSS Bugs on Latest Hacking News.



Hackers Selling 7 Million Robinhood User Email Addresses

Robinhood, a popular stock trading and investment company in the US, recently informed the public…

Hackers Selling 7 Million Robinhood User Email Addresses on Latest Hacking News.



How to Monitor Your Child’s Phone

If you want to keep track of your children’s device activity in the current day,…

How to Monitor Your Child’s Phone on Latest Hacking News.



New Golang-based Linux Malware Targets Ecommerce Platforms

Researchers discovered a new web skimmer in the wild found to be targeting online stores.…

New Golang-based Linux Malware Targets Ecommerce Platforms on Latest Hacking News.



What Avengers Movies Can Teach Us About Cybersecurity

Marvel has been entertaining us for the last 20 years. We have seen gods, super-soldiers, magicians, and other irradiated heroes fight baddies at galactic scales. The eternal fight of good versus evil. A little bit like in cybersecurity, goods guys fighting cybercriminals.If we choose to go with this fun analogy, is there anything useful we can learn from those movies? World-ending baddies

Researchers Detail Privilege Escalation Bugs Reported in Oracle VirtualBox

A now-patched vulnerability affecting Oracle VM VirtualBox could be potentially exploited by an adversary to compromise the hypervisor and cause a denial-of-service (DoS) condition. "Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox," the advisory reads. "Successful attacks of

Meta Defers Facebook Messenger, Instagram Default E2E Encryption Until 2023

Earlier this year, Facebook (now Meta) announced rolling out end-to-end encryption by default for all…

Meta Defers Facebook Messenger, Instagram Default E2E Encryption Until 2023 on Latest Hacking News.



More Stealthier Version of BrazKing Android Malware Spotted in the Wild

Banking apps from Brazil are being targeted by a more elusive and stealthier version of an Android remote access trojan (RAT) that's capable of carrying out financial fraud attacks by stealing two-factor authentication (2FA) codes and initiating rogue transactions from infected devices to transfer money from victims' accounts to an account operated by the threat actor. IBM X-Force dubbed the

The Importance of IT Security in Your Merger Acquisition

In the business world, mergers and acquisitions are commonplace as businesses combine, acquire, and enter various partnerships. Mergers and Acquisitions (M&A) are filled with often very complicated and complex processes to merge business processes, management, and a whole slew of other aspects of combining two businesses into a single logical entity. In the modern business world before and after

Monday, 22 November 2021

GoDaddy Data Breach Exposes Over 1 Million WordPress Customers' Data

Web hosting giant GoDaddy on Monday disclosed a data breach that resulted in the unauthorized access of data belonging to a total of 1.2 million active and inactive customers, making it the third security incident to come to light since 2018. In a filing with the U.S. Securities and Exchange Commission (SEC), the world's largest domain registrar said that a malicious third-party managed to gain

What to do if you receive a data breach notice

Receiving a breach notification doesn’t mean you’re doomed – here’s what you should consider doing in the hours and days after learning that your personal data has been exposed

The post What to do if you receive a data breach notice appeared first on WeLiveSecurity



California Pizza Kitchen Admits Data Breach Exposing SSNs Of Its Employees

The popular food chain California Pizza Kitchen has recently disclosed a data breach it suffered…

California Pizza Kitchen Admits Data Breach Exposing SSNs Of Its Employees on Latest Hacking News.



FBI Issued Flash Alert For FatPipe Zero-Day Bug Under Attack

FBI has recently warned users of an actively exploited zero-day vulnerability in FatPipe SD-WAN products.…

FBI Issued Flash Alert For FatPipe Zero-Day Bug Under Attack on Latest Hacking News.



Multiple Vulnerabilities In Zoom Apps Risk Meetings’ Security

Zoom has recently patched multiple security vulnerabilities affecting a range of its on-premise apps. Exploiting…

Multiple Vulnerabilities In Zoom Apps Risk Meetings’ Security on Latest Hacking News.



Vulnerability In Sky Routers Risked Over 6 Million Customers

Researchers found a critical vulnerability in sky routers that risked millions of users. While the…

Vulnerability In Sky Routers Risked Over 6 Million Customers on Latest Hacking News.



Researcher Earns $10K Bounty For A Google Cloud Project SSRF Flaw

A security researcher has recently found a flaw in Google Cloud Project that allows for…

Researcher Earns $10K Bounty For A Google Cloud Project SSRF Flaw on Latest Hacking News.



BrazKing Android Malware Evolves Into A Potent Banking Trojan

A new banking trojan is actively targeting Android users in Brazil. Researchers have identified this…

BrazKing Android Malware Evolves Into A Potent Banking Trojan on Latest Hacking News.



For Small Businesses, Cybersecurity is Non-Negotiable

For many years, it was large businesses and global corporations who were targets for cyber…

For Small Businesses, Cybersecurity is Non-Negotiable on Latest Hacking News.



Off-chain and On-chain cryptocurrency transactions

There’s more to the cryptocurrency community than buying and selling cryptos. While most investors just…

Off-chain and On-chain cryptocurrency transactions on Latest Hacking News.



New Golang-based Linux Malware Targeting eCommerce Websites

Weaknesses in e-commerce portals are being exploited to deploy a Linux backdoor as well as a credit card skimmer that's capable of stealing payment information from compromised websites. "The attacker started with automated e-commerce attack probes, testing for dozens of weaknesses in common online store platforms," researchers from Sansec Threat Research said in an analysis. "After a day and a

Hackers Exploiting ProxyLogon and ProxyShell Flaws in Spam Campaigns

Threat actors are exploiting ProxyLogon and ProxyShell exploits in unpatched Microsoft Exchange Servers as part of an ongoing spam campaign that leverages stolen email chains to bypass security software and deploy malware on vulnerable systems. The findings come from Trend Micro following an investigation into a number of intrusions in the Middle East that culminated in the distribution of a

Sunday, 21 November 2021

Facebook Postpones Plans for E2E Encryption in Messenger, Instagram Until 2023

Meta, the parent company of Facebook, Instagram, and WhatsApp, disclosed that it doesn't intend to roll out default end-to-end encryption (E2EE) across all its messaging services until 2023, pushing its original plans by at least a year. "We're taking our time to get this right and we don't plan to finish the global rollout of end-to-end encryption by default across all our messaging services

Saturday, 20 November 2021

RedCurl Corporate Espionage Hackers Return With Updated Hacking Tools

A corporate cyber-espionage hacker group has resurfaced after a seven-month hiatus with new intrusions targeting four companies this year, including one of the largest wholesale stores in Russia, while simultaneously making tactical improvements to its toolset in an attempt to thwart analysis. "In every attack, the threat actor demonstrates extensive red teaming skills and the ability to bypass

North Korean Hackers Found Behind a Range of Credential Theft Campaigns

A threat actor with ties to North Korea has been linked to a prolific wave of credential theft campaigns targeting research, education, government, media and other organizations, with two of the attacks also attempting to distribute malware that could be used for intelligence gathering. Enterprise security firm Proofpoint attributed the infiltrations to a group it tracks as TA406, and by the

Friday, 19 November 2021

Week in security with Tony Anscombe

ESET discovers watering hole attacks in the Middle East – Getting your life back on track after identity theft – How foreign influence operations have evolved

The post Week in security with Tony Anscombe appeared first on WeLiveSecurity



CYBERWARCON – Foreign influence operations grow up

Not long ago, disinformation campaigns were rather unsophisticated. These days, however, threat actors put serious time and effort into crafting their attacks.

The post CYBERWARCON – Foreign influence operations grow up appeared first on WeLiveSecurity



11 Malicious PyPI Python Libraries Caught Stealing Discord Tokens and Installing Shells

Cybersecurity researchers have uncovered as many as 11 malicious Python packages that have been cumulatively downloaded more than 41,000 times from the Python Package Index (PyPI) repository, and could be exploited to steal Discord access tokens, passwords, and even stage dependency confusion attacks. The Python packages have since been removed from the repository following responsible

U.S. Charged 2 Iranian Hackers for Threatening Voters During 2020 Presidential Election

The U.S. government on Thursday unsealed an indictment that accused two Iranian nationals of their involvement in cyber-enabled disinformation and threat campaign orchestrated to interfere in the 2020 presidential elections by gaining access to confidential voter information from at least one state election website. The two defendants in question — Seyyed Mohammad Hosein Musa Kazemi, 24, and

Have the .NET Framework’s Security Woes Finally Come to an End?

In spite of the fact that .NET has long been one of the more popular…

Have the .NET Framework’s Security Woes Finally Come to an End? on Latest Hacking News.



What happened in the easyJet data breach?

In May 2020, easyJet revealed that there had been a data breach in which the…

What happened in the easyJet data breach? on Latest Hacking News.



FBI Issues Flash Alert on Actively Exploited FatPipe VPN Zero-Day Bug

The U.S. Federal Bureau of Investigation (FBI) has disclosed that an unidentified threat actor has been exploiting a previously unknown weakness in the FatPipe MPVPN networking devices at least since May 2021 to obtain an initial foothold and maintain persistent access into vulnerable networks, making it the latest company to join the likes of Cisco, Fortinet, Citrix, Pulse Secure that have had

A Simple 5-Step Framework to Minimize the Risk of a Data Breach

Today's businesses run on data. They collect it from customers at every interaction, and they use it to improve efficiency, increase their agility, and provide higher levels of service. But it's becoming painfully obvious that all of that data businesses collect has also made them an enticing target for cybercriminals. With each passing day, the evidence of that grows. In the last few months,

Thursday, 18 November 2021

Experts Expose Secrets of Conti Ransomware Group That Made 25 Million from Victims

The clearnet and dark web payment portals operated by the Conti ransomware group have gone down in what appears to be an attempt to shift to new infrastructure after details about the gang's inner workings and its members were made public. According to MalwareHunterTeam, "while both the clearweb and Tor domains of the leak site of the Conti ransomware gang is online and working, both their

US Government declassifies data to foster would‑be defenders

US Government declassifies cybersecurity subjects they want you to learn about, and is hoping to pay you to learn them

The post US Government declassifies data to foster would‑be defenders appeared first on WeLiveSecurity



‘My bank account was in a shambles’: The ordeal of an identity theft victim

A victim of identity theft tells us how criminals used his identity to commit fraud and what it took to put his life back in order

The post ‘My bank account was in a shambles’: The ordeal of an identity theft victim appeared first on WeLiveSecurity



New Side Channel Attacks Re-Enable Serious DNS Cache Poisoning Attacks

Researchers have demonstrated yet another variant of the SAD DNS cache poisoning attack that leaves about 38% of the domain name resolvers vulnerable, enabling attackers to redirect traffic originally destined to legitimate websites to a server under their control. "The attack allows an off-path attacker to inject a malicious DNS record into a DNS cache," University of California researchers

Do you want to start building your website? Here are 6 helpful tips

Do you want to start building your own website? Well, this is mostly done by…

Do you want to start building your website? Here are 6 helpful tips on Latest Hacking News.



Golang-based BotenaGo Malware Targets IoT Devices With Dozens Of Exploits

“BotenaGo” new Golang malware is in the wild and focusses on attacking IoT devices. The…

Golang-based BotenaGo Malware Targets IoT Devices With Dozens Of Exploits on Latest Hacking News.



Critical Root RCE Bug Affects Multiple Netgear SOHO Router Models

Networking equipment company Netgear has released yet another round of patches to remediate a high-severity remote code execution vulnerability affecting multiple routers that could be exploited by remote attackers to take control of an affected system. Tracked as CVE-2021-34991 (CVSS score: 8.8), the pre-authentication buffer overflow flaw in small office and home office (SOHO) routers can lead

How to Build a Security Awareness Training Program that Yields Measurable Results

Organizations have been worrying about cyber security since the advent of the technological age. Today, digital transformation coupled with the rise of remote work has made the need for security awareness all the more critical. Cyber security professionals are continuously thinking about how to prevent cyber security breaches from happening, with employees and contractors often proving to be the

Microsoft Warns about 6 Iranian Hacking Groups Turning to Ransomware

Nation-state operators with nexus to Iran are increasingly turning to ransomware as a means of generating revenue and intentionally sabotaging their targets, while also engaging in patient and persistent social engineering campaigns and aggressive brute force attacks. No less than six threat actors affiliated with the West Asian country have been discovered deploying ransomware to achieve their

Wednesday, 17 November 2021

U.S., U.K. and Australia Warn of Iranian Hackers Exploiting Microsoft, Fortinet Flaws

Cybersecurity agencies from Australia, the U.K., and the U.S. on Wednesday released a joint advisory warning of active exploitation of Fortinet and Microsoft Exchange ProxyShell vulnerabilities by Iranian state-sponsored actors to gain initial access to vulnerable systems for follow-on activities, including data exfiltration and ransomware. The threat actor is believed to have leveraged multiple

Hackers Targeting Myanmar Use Domain Fronting to Hide Malicious Activities

A malicious campaign has been found leveraging a technique called domain fronting to hide command-and-control traffic by leveraging a legitimate domain owned by the Myanmar government to route communications to an attacker-controlled server with the goal of evading detection. The threat, which was observed in September 2021, deployed Cobalt Strike payloads as a stepping stone for launching

Israel's Candiru Spyware Found Linked to Watering Hole Attacks in U.K and Middle East

Israeli spyware vendor Candiru, which was added to an economic blocklist by the U.S. government this month, is said to have reportedly waged "watering hole" attacks against high-profile entities in the U.K. and the Middle East, new findings reveal. "The victimized websites belong to media outlets in the U.K., Yemen, and Saudi Arabia, as well as to Hezbollah; to government institutions in Iran (

On-Demand Webinar: Into the Cryptoverse

In the span of a few years, cryptocurrencies have gone from laughingstock and novelty to a serious financial instrument, and a major sector in high-tech. The price of Bitcoin and Ethereum has gone from single dollars to thousands, and they’re increasingly in the mainstream.  This is undoubtedly a positive development, as it opens new avenues for finance, transactions, tech developments, and more

New DoubleX Extension Analyzer Tool Detects Rogue Browser Extensions

Since extension hijacking can be troublesome to detect and manage, researchers have presented a new…

New DoubleX Extension Analyzer Tool Detects Rogue Browser Extensions on Latest Hacking News.



Tuesday, 16 November 2021

Facebook Bans Pakistani and Syrian Hacker Groups for Abusing its Platform

Meta, the company formerly known as Facebook, announced Tuesday that it took action against four separate malicious cyber groups from Pakistan and Syria who were found targeting people in Afghanistan, as well as journalists, humanitarian organizations, and anti-regime military forces in the West Asian country. The Pakistani threat actor, dubbed SideCopy, is said to have used the platform to

Strategic web compromises in the Middle East with a pinch of Candiru

ESET researchers have discovered strategic web compromise (aka watering hole) attacks against high‑profile websites in the Middle East

The post Strategic web compromises in the Middle East with a pinch of Candiru appeared first on WeLiveSecurity



New Blacksmith Exploit Bypasses Current Rowhammer Attack Defenses

Cybersecurity researchers have demonstrated yet another variation of the Rowhammer attack affecting all DRAM (dynamic random-access memory) chips that bypasses currently deployed mitigations, thereby effectively compromising the security of the devices. The new technique — dubbed "Blacksmith" (CVE-2021-42114, CVSS score: 9.0) — is designed to trigger bit flips on target refresh rate-enabled DRAM

Researchers Demonstrate New Way to Detect MITM Phishing Kits in the Wild

No fewer than 1,220 Man-in-the-Middle (MitM) phishing websites have been discovered as targeting popular online services like Instagram, Google, PayPal, Apple, Twitter, and LinkedIn with the goal of hijacking users' credentials and carrying out further follow-on attacks. The findings come from a new study undertaken by a group of researchers from Stony Brook University and Palo Alto Networks,

Joker Malware Disguised As Smart TV Remote App Targets Android Users

An Android malware campaign emerged on the Play Store with the malware midden within a…

Joker Malware Disguised As Smart TV Remote App Targets Android Users on Latest Hacking News.



Starter Templates Plugin Flaw Affected 1M+ WordPress Sites

A major security flaw in Starter Templates Plugin could allow underprivileged authenticated users to import…

Starter Templates Plugin Flaw Affected 1M+ WordPress Sites on Latest Hacking News.



Notorious Emotet Botnet Makes a Comeback with the Help of TrickBot Malware

The notorious Emotet malware is staging a comeback of sorts nearly 10 months after a coordinated law enforcement operation dismantled its command-and-control infrastructure in late January 2021. According to a new report from security researcher Luca Ebach, the infamous TrickBot malware is being used as an entry point to distribute what appears to be a new version of Emotet on systems previously

Monday, 15 November 2021

New 'Moses Staff' Hacker Group Targets Israeli Companies With Destructive Attacks

A new politically-motivated hacker group named "Moses Staff" has been linked to a wave of targeted attacks targeting Israeli organizations since September 2021 with the goal of plundering and leaking sensitive information prior to encrypting their networks, with no option to regain access or negotiate a ransom. "The group openly states that their motivation in attacking Israeli companies is to

SharkBot — A New Android Trojan Stealing Banking and Cryptocurrency Accounts

Cybersecurity researchers on Monday took the wraps off a new Android trojan that takes advantage of accessibility features on the devices to siphon credentials from banking and cryptocurrency services in Italy, the U.K., and the U.S. Dubbed "SharkBot" by Cleafy, the malware is designed to strike a total of 27 targets — counting 22 unnamed international banks in Italy and the U.K. as well as five

FBI systems compromised to send out fake attack alerts

Hackers break into the Bureau’s email systems to send out at least 100,000 emails warning recipients of imminent cyberattacks

The post FBI systems compromised to send out fake attack alerts appeared first on WeLiveSecurity



WP Reset PRO Plugin Bug Could Allow Wiping Site Databases

A serious security bug in the WP Reset PRO plugin could prove devastating for the…

WP Reset PRO Plugin Bug Could Allow Wiping Site Databases on Latest Hacking News.



HTML Smuggling Attack In The Wild Targeting The Banking Sector

Microsoft has recently shared details about a novel phishing strategy in the wild. Dubbed ‘HTML…

HTML Smuggling Attack In The Wild Targeting The Banking Sector on Latest Hacking News.



Driftwood Security Tool Released to Prevent Private Key Leaks

Exposed or leaked public and private keys can severely risk the security of apps and…

Driftwood Security Tool Released to Prevent Private Key Leaks on Latest Hacking News.



Researchers Demonstrate New Fingerprinting Attack on Tor Encrypted Traffic

A new analysis of website fingerprinting (WF) attacks aimed at the Tor web browser has revealed that it's possible for an adversary to glean a website frequented by a victim, but only in scenarios where the threat actor is interested in a specific subset of the websites visited by users. "While attacks can exceed 95% accuracy when monitoring a small set of five popular websites, indiscriminate (

Google Release ClusterFuzzLite Fuzzing Tool As Part Of CI/CD Workflows To Find Bugs

Google has recently announced the launch of ClusterFuzzLite – a dedicated fuzzing tool for CI/CD…

Google Release ClusterFuzzLite Fuzzing Tool As Part Of CI/CD Workflows To Find Bugs on Latest Hacking News.



MacOS Zero-Day Vulnerability Allowed Keylogging and Screengrabs

Google researchers discovered zero-day affecting macOS devices that could allow recording keystrokes or screen grabs.…

MacOS Zero-Day Vulnerability Allowed Keylogging and Screengrabs on Latest Hacking News.



North Korean Hackers Target Cybersecurity Researchers with Trojanized IDA Pro

Lazarus, the North Korea-affiliated state-sponsored group, is attempting to once again target security researchers with backdoors and remote access trojans using a trojanized pirated version of the popular IDA Pro reverse engineering software. The findings were reported by ESET security researcher Anton Cherepanov last week in a series of tweets. IDA Pro is an Interactive Disassembler that's

How to Tackle SaaS Security Misconfigurations

Whether it's Office 365, Salesforce, Slack, GitHub or Zoom, all SaaS apps include a host of security features designed to protect the business and its data. The job of ensuring these apps' security settings are properly configured falls on the security team. The challenge lies within how burdensome this responsibility is — each app has tens or hundreds of security settings to configure, in

Sunday, 14 November 2021

FBI's Email System Hacked to Send Out Fake Cyber Security Alert to Thousands

The U.S. Federal Bureau of Investigation (FBI) on Saturday confirmed unidentified threat actors have breached one of its email servers to blast hoax messages about a fake "sophisticated chain attack." The incident, which was first publicly disclosed by threat intelligence non-profit SpamHaus, involved sending rogue warning emails with the subject line "Urgent: Threat actor in systems"

Friday, 12 November 2021

Week in security with Tony Anscombe

Steps to take right after a data breach – What to consider before going passwordless – 7 million people hit by Robinhood data breach

The post Week in security with Tony Anscombe appeared first on WeLiveSecurity



Hackers Increasingly Using HTML Smuggling in Malware and Phishing Attacks

Threat actors are increasingly banking on the technique of HTML smuggling in phishing campaigns as a means to gain initial access and deploy an array of threats, including banking malware, remote administration trojans (RATs), and ransomware payloads. Microsoft 365 Defender Threat Intelligence Team, in a new report published Thursday, disclosed that it identified infiltrations distributing the 

Damage caused by hacking in the legal profession

The legal profession can also be hacked. In the Netherlands, the Bar Association is well…

Damage caused by hacking in the legal profession on Latest Hacking News.



Thursday, 11 November 2021

Abcbot — A New Evolving Wormable Botnet Malware Targeting Linux

Researchers from Qihoo 360's Netlab security team have released details of a new evolving botnet called "Abcbot" that has been observed in the wild with worm-like propagation features to infect Linux systems and launch distributed denial-of-service (DDoS) attacks against targets. While the earliest version of the botnet dates back to July 2021, new variants observed as recently as October 30

When the alarms go off: 10 key steps to take after a data breach

It’s often said that data breaches are no longer a matter of ‘if’, but ‘when’ – here’s what your organization should do, and avoid doing, in the case of a security breach

The post When the alarms go off: 10 key steps to take after a data breach appeared first on WeLiveSecurity



Hackers Exploit macOS Zero-Day to Hack Hong Kong Users with new Implant

Google researchers on Thursday disclosed that it found a watering hole attack in late August exploiting a now-parched zero-day in macOS operating system and targeting Hong Kong websites related to a media outlet and a prominent pro-democracy labor and political group to deliver a never-before-seen backdoor on compromised machines. "Based on our findings, we believe this threat actor to be a

Researchers Uncover Hacker-for-Hire Group That's Active Since 2015

A new cyber mercenary hacker-for-hire group dubbed "Void Balaur" has been linked to a string of cyberespionage and data theft activities targeting thousands of entities as well as human rights activists, politicians, and government officials around the world at least since 2015 for financial gain while lurking in the shadows. Named after a many-headed dragon from Romanian folklore, the adversary

TrickBot Operators Partner with Shatak Attackers for Conti Ransomware

The operators of TrickBot trojan are collaborating with the Shathak threat group to distribute their wares, ultimately leading to the deployment of Conti ransomware on infected machines. "The implementation of TrickBot has evolved over the years, with recent versions of TrickBot implementing malware-loading capabilities," Cybereason security analysts Aleksandar Milenkoski and Eli Salem said in a

Navigating The Threat Landscape 2021 – From Ransomware to Botnets

Though we are recovering from the worst pandemic, cyber threats have shown no sign of downshifting, and cybercriminals are still not short of malicious and advanced ways to achieve their goals.  The Global Threat Landscape Report indicates a drastic rise in sophisticated cyberattacks targeting digital infrastructures, organizations, and individuals in 2021. Threats can take different forms with

Iran's Lyceum Hackers Target Telecoms, ISPs in Israel, Saudi Arabia, and Africa

A state-sponsored threat actor allegedly affiliated with Iran has been linked to a series of targeted attacks aimed at internet service providers (ISPs) and telecommunication operators in Israel, Morocco, Tunisia, and Saudi Arabia, as well as a ministry of foreign affairs (MFA) in Africa, new findings reveal. The intrusions, staged by a group tracked as Lyceum, are believed to have occurred

Wednesday, 10 November 2021

Palo Alto Warns of Zero-Day Bug in Firewalls Using GlobalProtect Portal VPN

A new zero-day vulnerability has been disclosed in Palo Alto Networks GlobalProtect VPN that could be abused by an unauthenticated network-based attacker to execute arbitrary code on affected devices with root user privileges. Tracked as CVE-2021-3064 (CVSS score: 9.8), the security weakness impacts PAN-OS 8.1 versions earlier than PAN-OS 8.1.17. Massachusetts-based cybersecurity firm Randori

Google scores big win as court blocks iPhone tracking lawsuit

The tech giant wins an appeal against a claim that it unlawfully collected personal data of millions of iPhone users

The post Google scores big win as court blocks iPhone tracking lawsuit appeared first on WeLiveSecurity



Researchers Discover PhoneSpy Malware Spying on South Korean Citizens

An ongoing mobile spyware campaign has been uncovered snooping on South Korean residents using a family of 23 malicious Android apps to siphon sensitive information and gain remote control of the devices. "With more than a thousand South Korean victims, the malicious group behind this invasive campaign has had access to all the data, communications, and services on their devices," Zimperium

New Phishing Campaign Exploits Proofpoint’s Name To Steal Credentials

Phishing attacks keep surfacing online with innovative ways to trick users. The latest phishing campaign…

New Phishing Campaign Exploits Proofpoint’s Name To Steal Credentials on Latest Hacking News.



13 New Flaws in Siemens Nucleus TCP/IP Stack Impact Safety-Critical Equipment

As many as 13 security vulnerabilities have been discovered in the Nucleus TCP/IP stack, a software library now maintained by Siemens and used in three billion operational technology and IoT devices that could allow for remote code execution, denial-of-service (DoS), and information leak. Collectively called "NUCLEUS:13," successful attacks abusing the flaws can "result in devices going offline

14 New Security Flaws Found in BusyBox Linux Utility for Embedded Devices

Cybersecurity researchers on Tuesday disclosed 14 critical vulnerabilities in the BusyBox Linux utility that could be exploited to result in a denial-of-service (DoS) condition and, in select cases, even lead to information leaks and remote code execution. The security weaknesses, tracked from CVE-2021-42373 through CVE-2021-42386, affect multiple versions of the tool ranging from 1.16-1.33.1,

Tuesday, 9 November 2021

Microsoft Issues Patches for Actively Exploited Excel, Exchange Server 0-Day Bugs

Microsoft has released security updates as part of its monthly Patch Tuesday release cycle to address 55 vulnerabilities across Windows, Azure, Visual Studio, Windows Hyper-V, and Office, including fixes for two actively exploited zero-day flaws in Excel and Exchange Server that could be abused to take control of an affected system. Of the 55 glitches, six are rated Critical and 49 are rated as

Robinhood data breach affects 7 million people

An attacker gained access to some of Robinhood's customer support systems and stole the personal data of around a third of the app's userbase

The post Robinhood data breach affects 7 million people appeared first on WeLiveSecurity



Unique Challenges to Cyber-Security in Healthcare and How to Address Them

No business is out of danger of cyberattacks today. However, specific industries are particularly at risk and a favorite of attackers. For years, the healthcare industry has taken the brunt of ransomware attacks, data breaches, and other cyberattacks. Why is the healthcare industry particularly at risk for a cyberattack? What are the unique challenges to cybersecurity in healthcare, and how can

Phishing Attack Triggers Electronic Warfare Associates Data Breach

The US government defense contractor and a technology firm Electronic Warfare Associates (EWA), has recently…

Phishing Attack Triggers Electronic Warfare Associates Data Breach on Latest Hacking News.



Robinhood Trading App Suffers Data Breach Exposing 7 Million Users' Information

Robinhood on Monday disclosed a security breach affecting approximately 7 million customers, roughly a third of its user base, that resulted in unauthorized access of personal information by an unidentified threat actor. The commission-free stock trading and investing platform said the incident happened "late in the evening of November 3," adding it's in the process of notifying affected users.

Monday, 8 November 2021

U.S. Charges Ukrainian Hacker for Kaseya Attack; Seizes $6 Million from REvil Gang

The U.S. government on Monday charged a Ukrainian suspect, arrested in Poland last month, with deploying REvil ransomware to target multiple businesses and government entities in the country, including perpetrating the attack against software company Kaseya, marking the latest action to crack down on the cybercrime group and curb further attacks. According to unsealed court documents,

Passwordless authentication: Is your company ready to move beyond passwords?

Are the days numbered for ‘123456’? As Microsoft further nudges the world away from passwords, here’s what your organization should consider before going password-free.

The post Passwordless authentication: Is your company ready to move beyond passwords? appeared first on WeLiveSecurity



Suspected REvil Ransomware Affiliates Arrested in Global Takedown

Romanian law enforcement authorities have announced the arrest of two individuals for their roles as affiliates of the REvil ransomware family, dealing a severe blow to one of the most prolific cybercrime gangs in history. The suspects are believed to have orchestrated more than 5,000 ransomware attacks and extorted close to $600,000 from victims, according to Europol. The arrests, which

bZx DeFi Platform Lost $55 Million Stolen In The Latest Crypto Heist

Another cryptocurrency platform has suffered a cyber attack. The latest victim of the crypto heist…

bZx DeFi Platform Lost $55 Million Stolen In The Latest Crypto Heist on Latest Hacking News.



Experts Detail Malicious Code Dropped Using ManageEngine ADSelfService Exploit

At least nine entities across the technology, defense, healthcare, energy, and education industries were compromised by leveraging a recently patched critical vulnerability in Zoho's ManageEngine ADSelfService Plus self-service password management and single sign-on (SSO) solution. The spying campaign, which was observed starting September 22, 2021, involved the threat actor taking advantage of

BlackBerry Uncovers Initial Access Broker Linked to 3 Distinct Hacker Groups

A previously undocumented initial access broker has been unmasked as providing entry points to three different threat actors for mounting intrusions that range from financially motivated ransomware attacks to phishing campaigns. BlackBerry's research and intelligence team dubbed the entity "Zebra2104," with the group responsible for offering a means of a digital approach to ransomware syndicates

Multiple Vulnerabilities Discovered In Philips Tasy EMR Solution

numerous security vulnerabilities exist in the Philips Tasy EMR healthcare informatics solution. Exploiting these bugs…

Multiple Vulnerabilities Discovered In Philips Tasy EMR Solution on Latest Hacking News.



Types of Penetration Testing

If you are thinking about performing a penetration test on your organization, you might be interested in learning about the different types of tests available. With that knowledge, you'll be better equipped to define the scope for your project, hire the right expert and, ultimately, achieve your security objectives. What is penetration testing? Penetration testing, commonly referred to as "pen

Critical Flaws in Philips TASY EMR Could Expose Patient Data

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) is warning of critical vulnerabilities affecting Philips Tasy electronic medical records (EMR) system that could be exploited by remote threat actors to extract sensitive patient data from patient databases. "Successful exploitation of these vulnerabilities could result in patients' confidential data being exposed or extracted from

US CISA Pushes Vendors For BrakTooth Patches After PoC Goes Public

Months after researchers detailed Braktooth bugs, they now have released the PoC exploit to the…

US CISA Pushes Vendors For BrakTooth Patches After PoC Goes Public on Latest Hacking News.



Sunday, 7 November 2021

Two NPM Packages With 22 Million Weekly Downloads Found Backdoored

In what's yet another instance of supply chain attack targeting open-source software repositories, two popular NPM packages with cumulative weekly downloads of nearly 22 million were found to be compromised with malicious code by gaining unauthorized access to the respective developer's accounts. The two libraries in question are "coa," a parser for command-line options, and "rc," a

Heap Overflow Bug Affects All Linux Kernels Via TIPC Module

SentinelLabs recently shared a detailed post about a heap overflow vulnerability affecting Linux devices. This…

Heap Overflow Bug Affects All Linux Kernels Via TIPC Module on Latest Hacking News.



The Fastest WordPress Themes of 2021

When you create a WordPress website, there are a few key components that you need…

The Fastest WordPress Themes of 2021 on Latest Hacking News.



Facebook Sunsets Face Recognition And Deletes Users’ Data Due to Privacy Concerns

Shortly after going ‘Meta,’ the social media giant has announced abandoning a key Facebook feature that…

Facebook Sunsets Face Recognition And Deletes Users’ Data Due to Privacy Concerns on Latest Hacking News.



How to Prototype a Mobile Application in 2021

It is a commonly held belief that the best way to design a mobile application…

How to Prototype a Mobile Application in 2021 on Latest Hacking News.



Friday, 5 November 2021

Week in security with Tony Anscombe

What's it like working as a malware researcher? – ProtonMail and the battle for email privacy – Man charged with hacking, trying to extort US sports leagues

The post Week in security with Tony Anscombe appeared first on WeLiveSecurity



7 Reasons Why Cybersecurity Is Important to Your Marketing Strategy

Today, we live in a digital world where everyone is online, and businesses are relying…

7 Reasons Why Cybersecurity Is Important to Your Marketing Strategy on Latest Hacking News.



Getting to Know the Various Data Security Compliance Laws

When it comes to data security, it is expected for compliance regulations to evolve and…

Getting to Know the Various Data Security Compliance Laws on Latest Hacking News.



Ukraine Identifies Russian FSB Officers Hacking As Gamaredon Group

Ukraine's premier law enforcement and counterintelligence agency on Thursday disclosed the real identities of five individuals allegedly involved in cyberattacks attributed to a cyber-espionage group named Gamaredon, linking the members to Russia's Federal Security Service (FSB). Calling the hacker group "an FSB special project, which specifically targeted Ukraine," the Security Service of

How to Hide Your Torrenting Activity: A Handy Guide

It’s no secret that torrenting is a popular way to download content from the internet.…

How to Hide Your Torrenting Activity: A Handy Guide on Latest Hacking News.



U.S. Federal Agencies Ordered to Patch Hundreds of Actively Exploited Flaws

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has published a catalog of vulnerabilities, including from Apple, Cisco, Microsoft, and Google, that have known exploits and are being actively exploited by malicious cyber actors, in addition to requiring federal agencies to prioritize applying patches for those security flaws within "aggressive" timeframes. <!--adsense--> "These

U.S. Offers $10 Million Reward for Information on DarkSide Ransomware Group

The U.S. government on Thursday announced a $10 million reward for information that may lead to the identification or location of key individuals who hold leadership positions in the DarkSide ransomware group or any of its rebrands. On top of that, the State Department is offering bounties of up to $5 million for intel and tip-offs that could result in the arrest and/or conviction in any country

Thursday, 4 November 2021

Hardcoded SSH Key in Cisco Policy Suite Lets Remote Hackers Gain Root Access

Cisco Systems has released security updates to address vulnerabilities in multiple Cisco products that could be exploited by an attacker to log in as a root user and take control of vulnerable systems. Tracked as CVE-2021-40119, the vulnerability has been rated 9.8 in severity out of a maximum of 10 on the CVSS scoring system and stems from a weakness in the SSH authentication mechanism of Cisco

Google squashes Android zero‑day bug exploited in targeted attacks

Beyond the vulnerability in the Android kernel, the monthly round of security patches plugs another 38 security loopholes

The post Google squashes Android zero‑day bug exploited in targeted attacks appeared first on WeLiveSecurity



Critical RCE Vulnerability Reported in Linux Kernel's TIPC Module

Cybersecurity researchers have disclosed a security flaw in the Linux Kernel's Transparent Inter Process Communication (TIPC) module that could potentially be leveraged both locally as well as remotely to execute arbitrary code within the kernel and take control of vulnerable machines. The heap overflow vulnerability "can be exploited locally or remotely within a network to gain kernel

Our journey to API security at Raiffeisen Bank International

This article was written by Peter Gerdenitsch, Group CISO at Raiffeisen Bank International, and is based on a presentation given during Imvision's Executive Education Program, a series of events focused on how enterprises are taking charge of the API security lifecycle. Launching the "Security in Agile" program Headquartered in Vienna, Raiffeisen Bank International (RBI) operates across 14

US Sanctions Pegasus-maker NSO Group and 3 Others For Selling Spyware

The U.S. Commerce Department on Wednesday added four companies, including Israel-based spyware companies NSO Group and Candiru, to a list of entities engaging in "malicious cyber activities." The agency said the two companies were added to the list based on evidence that "these entities developed and supplied spyware to foreign governments that used these tools to maliciously target government

Wednesday, 3 November 2021

Win one for privacy – Swiss providers don’t have to talk

Security and privacy get a leg up in Proton’s legal challenge against data retention and disclosure obligations

The post Win one for privacy – Swiss providers don’t have to talk appeared first on WeLiveSecurity



What’s it like to work as a malware researcher? 10 questions answered

Three ESET malware researchers describe what their job involves and what it takes to embark on a successful career in this field

The post What’s it like to work as a malware researcher? 10 questions answered appeared first on WeLiveSecurity



BlackMatter Ransomware Reportedly Shutting Down; Latest Analysis Released

An analysis of new samples of BlackMatter ransomware for Windows and Linux has revealed the extent to which the operators have continually added new features and encryption capabilities in successive iterations over a three-month period. No fewer than 10 Windows and two Linux versions of the ransomware have been observed in the wild to date, Group-IB threat researcher Andrei Zhdanov said in a

Product Overview - Cynet Centralized Log Management

For most organizations today, the logs produced by their security tools and environments provide a mixed bag. On the one hand, they can be a trove of valuable data on security breaches, vulnerabilities, attack patterns, and general security insights. On the other, organizations don’t have the right means to manage the massive scale of logs and data produced to derive any value from it.  Log

How To Make Sure Your Business Website Is Running Smoothly

The Internet is a world of unlimited opportunities for any business. It’s a chance to…

How To Make Sure Your Business Website Is Running Smoothly on Latest Hacking News.



Why Web Application Firewalls and Website Security are so Crucial for all Organizations? 

 In the digital era, much is spoken about the criticality of web application firewalls and website…

Why Web Application Firewalls and Website Security are so Crucial for all Organizations?  on Latest Hacking News.



Mekotio Banking Trojan Resurfaces with New Attacking and Stealth Techniques

The operators behind the Mekotio banking trojan have resurfaced with a shift in its infection flow so as to stay under the radar and evade security software, while staging nearly 100 attacks over the last three months. "One of the main characteristics […] is the modular attack which gives the attackers the ability to change only a small part of the whole in order to avoid detection," researchers

Facebook to Shut Down Facial Recognition System and Delete Billions of Records

Facebook's newly-rebranded parent company Meta on Tuesday announced plans to discontinue its decade-old "Face Recognition" system and delete a massive trove of more than a billion users' facial recognition templates as part of a wider initiative to limit the use of the technology across its products. The Menlo Park tech giant described the about-face as "one of the largest shifts in facial

Tuesday, 2 November 2021

Google Warns of New Android 0-Day Vulnerability Under Active Targeted Attacks

Google has rolled out its monthly security patches for Android with fixes for 39 flaws, including a zero-day vulnerability that it said is being actively exploited in the wild in limited, targeted attacks. Tracked as CVE-2021-1048, the zero-day bug is described as a use-after-free vulnerability in the kernel that can be exploited for local privilege escalation. Use-after-free issues are

Man charged with hacking major US sports leagues to illegally stream games

On top of illegally streaming sports games for profit, the man is also believed to have attempted to extort MLB for $150,000

The post Man charged with hacking major US sports leagues to illegally stream games appeared first on WeLiveSecurity



Alert! Hackers Exploiting GitLab Unauthenticated RCE Flaw in the Wild

A now-patched critical remote code execution (RCE) vulnerability in GitLab's web interface has been detected as actively exploited in the wild, cybersecurity researchers warn, rendering a large number of internet-facing GitLab instances susceptible to attacks. Tracked as CVE-2021-22205, the issue relates to an improper validation of user-provided images that results in arbitrary code execution.

Google to Pay Hackers $31,337 for Exploiting Patched Linux Kernel Flaws

Google on Monday announced that it will pay security researchers to find exploits using vulnerabilities, previously remediated or otherwise, over the next three months as part of a new bug bounty program to improve the security of the Linux kernel. To that end, the company is expected to issue rewards worth $31,337 for exploiting privilege escalation in a lab environment for each patched

Monday, 1 November 2021

Apple Fixes Critical Bugs, Including A Zero-Day, With Latest iOS 14.8.1

The Cupertino giant has recently rolled out major update for those users who haven’t upgraded…

Apple Fixes Critical Bugs, Including A Zero-Day, With Latest iOS 14.8.1 on Latest Hacking News.



HashThemes Demo Importer Plugin Bug Could Allow Wiping WordPress Sites

WordPress admins have to deal with another vulnerable WordPress plugin that poses a highly severe…

HashThemes Demo Importer Plugin Bug Could Allow Wiping WordPress Sites on Latest Hacking News.



Chrome Zero-Day Mayhem Continues – Google Fixed Two More Flaws

Heads up, Chrome users! Google has once again rolled out a Chrome browser update addressing…

Chrome Zero-Day Mayhem Continues – Google Fixed Two More Flaws on Latest Hacking News.



Cross-Site Scripting Vulnerability Riddled NextScripts WordPress Plugin

Heads up, WordPress admins! The NextScripts WordPress plugin had a serious cross-site scripting vulnerability that…

Cross-Site Scripting Vulnerability Riddled NextScripts WordPress Plugin on Latest Hacking News.



OptinMonster Plugin Bug Potentially Risked Over A Million WordPress Websites

A serious information disclosure bug existed in the WordPress plugin OptinMonster. Exploiting the vulnerability could…

OptinMonster Plugin Bug Potentially Risked Over A Million WordPress Websites on Latest Hacking News.



Facebook Goes “Meta” To Emphasize The Firm’s Expanding VR Focuses

After much hype, Facebook has put an end to all the gossips and speculation by…

Facebook Goes “Meta” To Emphasize The Firm’s Expanding VR Focuses on Latest Hacking News.



Cream Finance Crypto Exchange Hacked Again Losing $130 Million

The cryptocurrency exchange Cream Finance got hacked again to lose millions to the attacker. As…

Cream Finance Crypto Exchange Hacked Again Losing $130 Million on Latest Hacking News.



Critical Flaws Uncovered in Pentaho Business Analytics Software

Multiple vulnerabilities have been disclosed in Hitachi Vantara's Pentaho Business Analytics software that could be abused by malicious actors to upload arbitrary data files and even execute arbitrary code on the underlying host system of the application. The security weaknesses were reported by researchers Alberto Favero from German cybersecurity firm Hawsec and Altion Malka from Census Labs

Securing SaaS Apps — CASB vs. SSPM

There is often confusion between Cloud Access Security Brokers (CASB) and SaaS Security Posture Management (SSPM) solutions, as both are designed to address security issues within SaaS applications. CASBs protect sensitive data by implementing multiple security policy enforcements to safeguard critical data. For identifying and classifying sensitive information, like Personally Identifiable

New 'Trojan Source' Technique Lets Hackers Hide Vulnerabilities in Source Code

A novel class of vulnerabilities could be leveraged by threat actors to inject visually deceptive malware in a way that's semantically permissible but alters the logic defined by the source code, effectively opening the door to more first-party and supply chain risks. Dubbed "Trojan Source attacks," the technique "exploits subtleties in text-encoding standards such as Unicode to produce source

Researchers Uncover 'Pink' Botnet Malware That Infected Over 1.6 Million Devices

Cybersecurity researchers disclosed details of what they say is the "largest botnet" observed in the wild in the last six years, infecting over 1.6 million devices primarily located in China, with the goal of launching distributed denial-of-service (DDoS) attacks and inserting advertisements into HTTP websites visited by unsuspecting users. Qihoo 360's Netlab security team dubbed the botnet "