Over a million domains are at risk of being hijacked through the Sitting Ducks attack, a DNS #vulnerability.
The attack is being used by Russian-nexus cybercriminals to serve #malware and conduct spams, affecting over 35,000 domains since 2018.
Read: https://thehackernews.com/2024/08/over-1-million-domains-at-risk-of.html
The attack is being used by Russian-nexus cybercriminals to serve #malware and conduct spams, affecting over 35,000 domains since 2018.
Read: https://thehackernews.com/2024/08/over-1-million-domains-at-risk-of.html
π€―14π7π₯7
Researchers report increased abuse of Cloudflare's TryCloudflare service for delivering malware like AsyncRAT and XWorm through phishing emails with deceptive PDFs, exposing businesses to sophisticated cyberattack.
Read: https://thehackernews.com/2024/08/cybercriminals-abusing-cloudflare.html
Read: https://thehackernews.com/2024/08/cybercriminals-abusing-cloudflare.html
π€―13π5π₯5π±4π1π€1
Two Russian cybercriminals involved in major financial fraud schemes have been released in a massive prisoner swap.
The exchange included 16 individuals from various countries, underscoring the global stakes.
Read about it here: https://thehackernews.com/2024/08/us-releases-high-profile-russian.html
The exchange included 16 individuals from various countries, underscoring the global stakes.
Read about it here: https://thehackernews.com/2024/08/us-releases-high-profile-russian.html
π₯15π10π±5π€―2β‘1
Researchers uncover new Windows backdoor, BITSLOTH, using BITS for C2 operations.
BITSLOTH can perform various malicious activities, including keylogging and screen capture.
Read: https://thehackernews.com/2024/08/new-windows-backdoor-bitsloth-exploits.html
BITSLOTH can perform various malicious activities, including keylogging and screen capture.
Read: https://thehackernews.com/2024/08/new-windows-backdoor-bitsloth-exploits.html
β‘10π€―6π3π3π₯1
A Russia-linked threat actor, APT28, is using a car-for-sale #phishing lure to deliver a new Windows backdoor called HeadLace.
APT28 repurposes tactics from other Russian groups, demonstrating evolving cyber threats.
Read: https://thehackernews.com/2024/08/apt28-targets-diplomats-with-headlace.html
APT28 repurposes tactics from other Russian groups, demonstrating evolving cyber threats.
Read: https://thehackernews.com/2024/08/apt28-targets-diplomats-with-headlace.html
π₯12π9
A Taiwanese research institute specializing in computing was breached by nation-state hackers linked to China.
The attack involved sophisticated tools like ShadowPad and Cobalt Strike, exploiting outdated software vulnerabilities.
Read: https://thehackernews.com/2024/08/apt41-hackers-use-shadowpad-cobalt.html
The attack involved sophisticated tools like ShadowPad and Cobalt Strike, exploiting outdated software vulnerabilities.
Read: https://thehackernews.com/2024/08/apt41-hackers-use-shadowpad-cobalt.html
π13π₯8π1
New Mirai botnet variant targets OFBiz ERP system vulnerability. Exploitation can lead to severe data breaches and business disruption.
Attackers are using directory traversal techniques, exploiting a flaw that was patched in May.
Read: https://thehackernews.com/2024/08/mirai-botnet-targeting-ofbiz-servers.html
Check your ERP systems now. Apply patches immediately.
Attackers are using directory traversal techniques, exploiting a flaw that was patched in May.
Read: https://thehackernews.com/2024/08/mirai-botnet-targeting-ofbiz-servers.html
Check your ERP systems now. Apply patches immediately.
π12β‘4
New DDoS attack campaign targets Jupyter Notebooks.
Misconfigured Jupyter Notebooks are being exploited, highlighting vulnerabilities in common data science tools.
The attack, named Panamorfi, uses a Java-based tool called mineping to execute TCP flood DDoS attacks, consuming server resources.
Read: https://thehackernews.com/2024/08/hackers-exploit-misconfigured-jupyter.html
Ensure your Jupyter Notebooks are properly configured to prevent exploitation.
Misconfigured Jupyter Notebooks are being exploited, highlighting vulnerabilities in common data science tools.
The attack, named Panamorfi, uses a Java-based tool called mineping to execute TCP flood DDoS attacks, consuming server resources.
Read: https://thehackernews.com/2024/08/hackers-exploit-misconfigured-jupyter.html
Ensure your Jupyter Notebooks are properly configured to prevent exploitation.
π₯16π9
The U.S. Department of Justice and Federal Trade Commission have sued TikTok for violating children's privacy laws.
TikTok is accused of illegally collecting children's personal information without parental consent, violating COPPA and a prior consent order.
Read: https://thehackernews.com/2024/08/doj-and-ftc-sue-tiktok-for-violating.html
TikTok is accused of illegally collecting children's personal information without parental consent, violating COPPA and a prior consent order.
Read: https://thehackernews.com/2024/08/doj-and-ftc-sue-tiktok-for-violating.html
π34π9π€7π₯4π±3β‘1π€―1
Evasive Panda compromises an ISP to push malicious software updates.
The group used DNS poisoning to alter update mechanisms, deploying malware on both macOS and Windows systems.
Read: https://thehackernews.com/2024/08/china-linked-hackers-compromise-isp-to.html
The group used DNS poisoning to alter update mechanisms, deploying malware on both macOS and Windows systems.
Read: https://thehackernews.com/2024/08/china-linked-hackers-compromise-isp-to.html
π16β‘9π₯4
A new Android banking trojan, BlankBot, is targeting Turkish users to steal financial information.
It performs keylogging, screen recording, and intercepts SMS messages, posing a severe threat to user data.
Read: https://thehackernews.com/2024/08/new-android-trojan-blankbot-targets.html
It performs keylogging, screen recording, and intercepts SMS messages, posing a severe threat to user data.
Read: https://thehackernews.com/2024/08/new-android-trojan-blankbot-targets.html
π19π11π₯5β‘2
A high-severity vulnerability (CVE-2024-6242) has been found in Rockwell Automation ControlLogix 1756 devices.
Exploiting this vulnerability could lead to unauthorized CIP commands, affecting device configurations and user projects.
Read: https://thehackernews.com/2024/08/critical-flaw-in-rockwell-automation.html
Exploiting this vulnerability could lead to unauthorized CIP commands, affecting device configurations and user projects.
Read: https://thehackernews.com/2024/08/critical-flaw-in-rockwell-automation.html
π13π₯5β‘1
Cybersecurity incident response faces major challenges: timely detection, data collection, and coordination.
Quick, effective responses minimize damage. Tools like Wazuh boost readiness through automation and third-party integration.
Learn more: https://thehackernews.com/2024/08/enhancing-incident-response-readiness.html
Quick, effective responses minimize damage. Tools like Wazuh boost readiness through automation and third-party integration.
Learn more: https://thehackernews.com/2024/08/enhancing-incident-response-readiness.html
π9π€―5β‘1π₯1π€1
Organizations in Kazakhstan are targeted by a new threat cluster, Bloody Wolf, distributing STRRAT malware.
This #malware allows attackers to hijack corporate computers and steal restricted data for as little as $80.
Phishing emails impersonating government agencies trick victims into installing malicious Java files.
Read: https://thehackernews.com/2024/08/kazakh-organizations-targeted-by-bloody.html
Ensure your team is aware of these tactics and bolster email security measures.
This #malware allows attackers to hijack corporate computers and steal restricted data for as little as $80.
Phishing emails impersonating government agencies trick victims into installing malicious Java files.
Read: https://thehackernews.com/2024/08/kazakh-organizations-targeted-by-bloody.html
Ensure your team is aware of these tactics and bolster email security measures.
π15β‘3π₯1π€―1
Researchers uncover design flaws in Windows Smart App Control and SmartScreen, allowing hackers to bypass security measures and gain system access undetected.
Learn more: https://thehackernews.com/2024/08/researchers-uncover-flaws-in-windows.html
Learn more: https://thehackernews.com/2024/08/researchers-uncover-flaws-in-windows.html
π₯13π7π6β‘4
A zero-day vulnerability in Apache OFBiz ERP system has been disclosed, allowing remote code execution.
This vulnerability, CVE-2024-38856, has a critical CVSS score of 9.8, making it extremely dangerous for businesses using this software.
Read: https://thehackernews.com/2024/08/new-zero-day-flaw-in-apache-ofbiz-erp.html
Share this to raise awareness!
This vulnerability, CVE-2024-38856, has a critical CVSS score of 9.8, making it extremely dangerous for businesses using this software.
Read: https://thehackernews.com/2024/08/new-zero-day-flaw-in-apache-ofbiz-erp.html
Share this to raise awareness!
π13π€―10π₯4π±4π2
Google has patched a new Android kernel vulnerability, CVE-2024-36971, that allows RCE.
It has been actively exploited by commercial spyware vendors in targeted attacks, posing a severe risk to Android users.
Read: https://thehackernews.com/2024/08/google-patches-new-android-kernel.html
It has been actively exploited by commercial spyware vendors in targeted attacks, posing a severe risk to Android users.
Read: https://thehackernews.com/2024/08/google-patches-new-android-kernel.html
π€13π7π6π₯4π±3
Kaspersky has identified a new Android spyware, LianSpy, targeting users in Russia since 2021.
This malware captures screencasts, exfiltrates user files, and harvests call logs and app lists.
Find details here: https://thehackernews.com/2024/08/new-android-spyware-lianspy-evades.html
This malware captures screencasts, exfiltrates user files, and harvests call logs and app lists.
Find details here: https://thehackernews.com/2024/08/new-android-spyware-lianspy-evades.html
π₯15π11π€7π±4π3
North Korea's Moonstone Sleet is pushing malicious npm packages to infect Windows systems.
Despite low downloads, the packages aimed to mimic popular libraries and potentially cause significant harm.
Read: https://thehackernews.com/2024/08/north-korean-hackers-moonstone-sleet.html
Despite low downloads, the packages aimed to mimic popular libraries and potentially cause significant harm.
Read: https://thehackernews.com/2024/08/north-korean-hackers-moonstone-sleet.html
π16π±3π₯2
Innovate with AI Pioneers Gather and connect with developers across the community at Intel Innovation, September 24-25. Witness the breakthroughs propelling AI into the future and be a part of the revolution.
Donβt miss out β register now: https://thn.news/innovation-2024
Donβt miss out β register now: https://thn.news/innovation-2024
π₯10π6β‘3π±3π€1
Insider threats account for 26% of SaaS security incidents.
These threats are challenging to detect because insiders often have valid credentials and access.
ITDR platforms can help by monitoring behavioral clues and flagging anomalies.
Learn how: https://thehackernews.com/2024/08/suspicious-minds-insider-threats-in.html
These threats are challenging to detect because insiders often have valid credentials and access.
ITDR platforms can help by monitoring behavioral clues and flagging anomalies.
Learn how: https://thehackernews.com/2024/08/suspicious-minds-insider-threats-in.html
π10π€4π₯1π1