Researchers have uncovered details of the ΓPIC and SQUIP vulnerabilities in Intel and AMD processors that allow attackers to obtain encryption keys and other secret information.
Read: https://thehackernews.com/2022/08/pic-and-squip-vulnerabilities-found-in.html
Read: https://thehackernews.com/2022/08/pic-and-squip-vulnerabilities-found-in.html
North Korea-backed Lazarus Group has been observed attacking job seekers with #macOS malware that can run on Apple Macs with Intel and M1 chipsets.
Read details: https://thehackernews.com/2022/08/north-korea-hackers-spotted-targeting.html
Read details: https://thehackernews.com/2022/08/north-korea-hackers-spotted-targeting.html
The Hacker News
North Korea Hackers Spotted Targeting Job Seekers with macOS Malware
North Korea-backed Lazarus Group has been observed attacking job seekers with malware that can run on Apple Macs with Intel and M1 chipsets.
π3
Nearly 1.31 million users have been targeted by malicious or unwanted web browser extensions at least once during this year.
Read details: https://thehackernews.com/2022/08/malicious-browser-extensions-targeted.html
Read details: https://thehackernews.com/2022/08/malicious-browser-extensions-targeted.html
π5
RubyGems, the official Ruby package manager, now requires popular package maintainers to use multi-factor authentication (MFA).
Read: https://thehackernews.com/2022/08/rubygems-makes-multi-factor.html
Read: https://thehackernews.com/2022/08/rubygems-makes-multi-factor.html
Google releases an important update for the Chrome browser for Mac, Linux, and Windows systems to patch several new vulnerabilities, including a zero-day that is being exploited for attacks.
Read details: https://thehackernews.com/2022/08/new-google-chrome-zero-day.html
Read details: https://thehackernews.com/2022/08/new-google-chrome-zero-day.html
π4
Researchers have spotted a new Android dropper trojan that's currently in development, designed to bypass Google's new security mechanisms introduced with the latest Android 13.
Details: https://thehackernews.com/2022/08/cybercriminals-developing-bugdrop.html
Details: https://thehackernews.com/2022/08/cybercriminals-developing-bugdrop.html
Apple releases security updates for iOS, iPadOS, and macOS platforms to fix two new zero-day vulnerabilities that are exploited by threat actors to compromise users.
Read: https://thehackernews.com/2022/08/apple-releases-security-updates-to.html
Read: https://thehackernews.com/2022/08/apple-releases-security-updates-to.html
π4
Hackers associated with BazarLoader, TrickBot, and IcedID are increasingly using the Bumblebee malware loader in their campaigns to breach target networks for post-exploitation activities.
Read: https://thehackernews.com/2022/08/hackers-using-bumblebee-loader-to.html
Read: https://thehackernews.com/2022/08/hackers-using-bumblebee-loader-to.html
π4
Researchers confirm that Chinese APT41 hackers attacked at least 13 organizations in the U.S., Taiwan, India, Vietnam, and China during four separate campaigns in 2021.
Read details: https://thehackernews.com/2022/08/china-backed-apt41-hackers-targeted-13.html
Read details: https://thehackernews.com/2022/08/china-backed-apt41-hackers-targeted-13.html
π3π1
Researchers detail DarkTortilla, an evasive crypter used by hackers to spread a broad array of commodity malware and targeted payloads such as Cobalt Strike and Metasploit, likely since 2015.
Read details: https://thehackernews.com/2022/08/researchers-detail-evasive-darktortilla.html
Read details: https://thehackernews.com/2022/08/researchers-detail-evasive-darktortilla.html
π3
Researchers have discovered a new high-severity vulnerability in the Amazon Ring app for Android, allowing rogue apps to access sensitive information.
Read details: https://thehackernews.com/2022/08/new-amazon-ring-vulnerability-could.html
Read details: https://thehackernews.com/2022/08/new-amazon-ring-vulnerability-could.html
π10
Google says it has fended off the largest ever HTTPS-based distributed denial of service (DDoS) attack to date, which peaked at 46 million requests per second.
Read details: https://thehackernews.com/2022/08/google-cloud-blocks-record-ddos-attack.html
Read details: https://thehackernews.com/2022/08/google-cloud-blocks-record-ddos-attack.html
π€―14π₯3π1
An ongoing wave of malware attacks targeting hospitality, hotel, and travel organizations has been tied to a financially motivated cybercrime group.
Read details: https://thehackernews.com/2022/08/cybercrime-group-ta558-targeting.html
Read details: https://thehackernews.com/2022/08/cybercrime-group-ta558-targeting.html
π8π₯1
CISA has updated its Known Exploited Vulnerabilities Catalog with 7 new vulnerabilities based on evidence of active exploitation.
Read details: https://thehackernews.com/2022/08/cisa-adds-7-new-actively-exploited.html
CVE-2017-15944, CVE-2022-21971, CVE-2022-26923, CVE-2022-2856, CVE-2022-32893, CVE-2022-32894, CVE-2022-22536
Read details: https://thehackernews.com/2022/08/cisa-adds-7-new-actively-exploited.html
CVE-2017-15944, CVE-2022-21971, CVE-2022-26923, CVE-2022-2856, CVE-2022-32893, CVE-2022-32894, CVE-2022-22536
π6π₯2
A new Grandoreiro banking trojan campaign has been spotted targeting manufacturers in Spanish-speaking countries such as Spain and Mexico.
Read details: https://thehackernews.com/2022/08/new-grandoreiro-banking-malware.html
Read details: https://thehackernews.com/2022/08/new-grandoreiro-banking-malware.html
π11π€―3
Researchers have uncovered multiple vulnerabilities in ultra-wideband (UWB) real-time location systems (RTLS) that allow threat actors to launch adversary-in-the-middle (AitM) attacks and manipulate location data.
Read details: https://thehackernews.com/2022/08/rtls-systems-found-vulnerable-to-mitm.html
Read details: https://thehackernews.com/2022/08/rtls-systems-found-vulnerable-to-mitm.html
π19π€―1
Researchers have discovered counterfeit Android phones of popular smartphone brands are pre-infected with multiple trojans designed to target WhatsApp and WhatsApp Business.
Read details: https://thehackernews.com/2022/08/researchers-find-counterfeit-phones.html
Read details: https://thehackernews.com/2022/08/researchers-find-counterfeit-phones.html
π19π€―3
U.S. cybersecurity agency CISA warns of active exploitation of a high-severity reflected/amplified DoS attack vulnerability (CVE-2022-0028) in Palo Alto Networks' PAN-OS.
Read details: https://thehackernews.com/2022/08/cisa-warns-of-active-exploitation-of.html
Read details: https://thehackernews.com/2022/08/cisa-warns-of-active-exploitation-of.html
π25π±5π4π₯2π1
Researchers have developed a new Air-Gap attack in which attackers can exfiltrate sensitive information from air-gapped computers to smartphones located a few meters away via Speakers-to-Gyroscope covert channel.
Details: https://thehackernews.com/2022/08/new-air-gap-attack-uses-mems-gyroscope.html
Details: https://thehackernews.com/2022/08/new-air-gap-attack-uses-mems-gyroscope.html
π30π±28π€3π2π₯1
Iranian hackers (UNC3890) have been linked to a series of attacks aimed at Israeli shipping, government, energy, and healthcare organizations as part of an espionage-focused campaign.
Read details: https://thehackernews.com/2022/08/suspected-iranian-hackers-targeted.html
Read details: https://thehackernews.com/2022/08/suspected-iranian-hackers-targeted.html
π60π€―15π11π₯9π±6π€3
Hackers have updated the nasty XCSSET malware to add support for macOS Monterey by updating the source code components to Python 3.
Read details: https://thehackernews.com/2022/08/xcsset-malware-updates-with-python-3-to.html
Read details: https://thehackernews.com/2022/08/xcsset-malware-updates-with-python-3-to.html
π₯27π19π€―11π5π±5π€2