Raspberry Robin worm infected nearly 3,000 devices in nearly 1,000 organizations, allowing other cybercriminals to deploy malware such as IcedID, Bumblebee, TrueBot, and Clop ransomware.
Read: https://thehackernews.com/2022/10/raspberry-robin-operators-selling.html
Read: https://thehackernews.com/2022/10/raspberry-robin-operators-selling.html
🤯18👍8🔥5⚡2
⚡ Google is rolling out an emergency update for the Chrome browser to patch an actively exploited zero-day vulnerability (CVE-2022-3723).
Read: https://thehackernews.com/2022/10/google-issues-urgent-chrome-update-to.html
Read: https://thehackernews.com/2022/10/google-issues-urgent-chrome-update-to.html
👍50😁9🤯8⚡4😱4🔥1
Cyber espionage group Cranefly uses stealthy tactics to target employees dealing with corporate transactions.
Read: https://thehackernews.com/2022/10/researchers-uncover-stealthy-techniques.html
Read: https://thehackernews.com/2022/10/researchers-uncover-stealthy-techniques.html
🔥17👍7🤯6😁4⚡1
5 malicious Android dropper apps with over 130,000 cumulative installs have been discovered in the Google Play Store, spreading banking trojans like SharkBot and Vultur to steal users' financial data and perform on-device fraud.
Read: https://thehackernews.com/2022/10/these-dropper-apps-on-play-store.html
Read: https://thehackernews.com/2022/10/these-dropper-apps-on-play-store.html
🔥19👍14😱6👏3⚡2
Researchers have uncovered several serious vulnerabilities in Juniper Networks devices, some of which could be exploited for code execution.
Read: https://thehackernews.com/2022/10/high-severity-flaws-in-juniper-junos-os.html
Read: https://thehackernews.com/2022/10/high-severity-flaws-in-juniper-junos-os.html
⚡22👍21😁4🔥3
Communication services provider Twilio disclosed another security incident involving the same threat actor behind the August hack.
Read: https://thehackernews.com/2022/10/twilio-reveals-another-breach-from-same.html
Read: https://thehackernews.com/2022/10/twilio-reveals-another-breach-from-same.html
🤯34👍9🔥8👏8😱7⚡6😁4
Researchers describe a recently reported vulnerability in Samsung's Galaxy Store app that could have enabled attackers to install and/or launch malicious apps and potentially carry out remote attacks.
Read: https://thehackernews.com/2022/10/samsung-galaxy-store-bug-couldve-let.html
Read: https://thehackernews.com/2022/10/samsung-galaxy-store-bug-couldve-let.html
🤯34👍11🔥5😱4⚡3👏2
An unofficial patch has been made available for an actively exploited vulnerability in Microsoft Windows that allows files signed with malformed signatures to bypass Mark-of-the-Web (MotW) protection.
Read: https://thehackernews.com/2022/10/unofficial-patch-released-for-new.html
Read: https://thehackernews.com/2022/10/unofficial-patch-released-for-new.html
👍32👏4🔥3🤯3😱3😁2
GitHub patched a new high-severity repojacking bug that could have allowed attackers to access other users' repositories and perform supply chain attacks.
Read: https://thehackernews.com/2022/10/github-repojacking-bug-couldve-allowed.html
Read: https://thehackernews.com/2022/10/github-repojacking-bug-couldve-allowed.html
🤯44👍12⚡10👏6🤔5🔥4😁4
Hackers behind the Fodcha distributed denial-of-service (DDoS) botnet has resurfaced with new capabilities.
Read: https://thehackernews.com/2022/10/fodcha-ddos-botnet-resurfaces-with-new.html
Read: https://thehackernews.com/2022/10/fodcha-ddos-botnet-resurfaces-with-new.html
👍32🔥12🤯4🤔3😱3😁1
A critical vulnerability (CVE-2022-36537) has been reported and patched in ConnectWise R1Soft Server Backup Manager software that could lead to remote code execution and supply chain attacks.
Read: https://thehackernews.com/2022/11/critical-rce-vulnerability-reported-in.html
Read: https://thehackernews.com/2022/11/critical-rce-vulnerability-reported-in.html
🔥20👍11🤯4😱2
Chinese state-sponsored hackers have been observed employing a new stealthy infection chain in their LODEINFO malware attacks targeting Japanese entities.
Read: https://thehackernews.com/2022/11/chinese-hackers-using-new-stealthy.html
Read: https://thehackernews.com/2022/11/chinese-hackers-using-new-stealthy.html
👍13🤯8🔥5👏3😁2⚡1
Researchers reveal details of a critical authentication bypass vulnerability in Jupyter Notebooks for Microsoft Azure Cosmos DB, which could have allowed attackers to achieve remote code execution on containers.
Read: https://thehackernews.com/2022/11/researchers-disclose-details-of.html
Read: https://thehackernews.com/2022/11/researchers-disclose-details-of.html
⚡12👍9🔥5🤯4😁1
Nothing CRITICAL this time!
OpenSSL has released patches for 2 new high-severity flaws (CVE-2022-3786 / CVE-2022-3602).
https://thehackernews.com/2022/11/just-in-openssl-releases-patch-for-2.html
CVE-2022-3602 has been downgraded from CRITICAL to HIGH as it cannot be exploited in most widely used architectures and platforms.
OpenSSL has released patches for 2 new high-severity flaws (CVE-2022-3786 / CVE-2022-3602).
https://thehackernews.com/2022/11/just-in-openssl-releases-patch-for-2.html
CVE-2022-3602 has been downgraded from CRITICAL to HIGH as it cannot be exploited in most widely used architectures and platforms.
👏34👍24😁16🤔10🔥7😱5
File hosting service Dropbox fell victim to a phishing campaign that allowed unknown hackers gained unauthorized access to 130 of its source code repositories on GitHub.
Read: https://thehackernews.com/2022/11/dropbox-breach-hackers-unauthorizedly.html
Read: https://thehackernews.com/2022/11/dropbox-breach-hackers-unauthorizedly.html
😱42🔥17🤯13😁11👍8⚡5
Researchers warn of booby-trapped VPN applications infecting Android devices with new SandStrike spyware.
Read: https://thehackernews.com/2022/11/experts-warn-of-sandstrike-android.html
Read: https://thehackernews.com/2022/11/experts-warn-of-sandstrike-android.html
👍17🤯11🔥4🤔3
As part of an adware and information theft campaign, four Android apps from the same developer directed victims to malicious websites.
Read: https://thehackernews.com/2022/11/these-android-apps-with-million-play.html
Read: https://thehackernews.com/2022/11/these-android-apps-with-million-play.html
👍27🔥12🤯10
🔥26👍9⚡8😱4🤯3
TikTok has revised its privacy policy for European users to explicitly clarify that some employees from around the world, including China, may access users' data.
Details: https://thehackernews.com/2022/11/new-tiktok-privacy-policy-confirms.html
Details: https://thehackernews.com/2022/11/new-tiktok-privacy-policy-confirms.html
😁63😱25👍15🔥14🤯11👏5
Hackers behind RomCom RAT attacks are using rogue versions of popular software such as SolarWinds Network Performance Monitor, KeePass password manager, and PDF Reader Pro to spread the malware.
Read: https://thehackernews.com/2022/11/hackers-using-rogue-versions-of-keepass.html
Read: https://thehackernews.com/2022/11/hackers-using-rogue-versions-of-keepass.html
🤯26👍12🔥9⚡8👏8
A new analysis of the hacking tools employed by the Black Basta ransomware operation has revealed its links to FIN7 (aka Carbanak) hacker group.
Details: https://thehackernews.com/2022/11/researchers-find-links-bw-black-basta.html
Details: https://thehackernews.com/2022/11/researchers-find-links-bw-black-basta.html
👍23🔥5🤯5⚡3🤔3😁2