π΅οΈββοΈ U.S. agencies warn about Scattered Spider cybercriminals using advanced phishing to steal data and extort victims.
Learn their tactics, protect your organization: https://thehackernews.com/2023/11/us-cybersecurity-agencies-warn-of.html
Learn their tactics, protect your organization: https://thehackernews.com/2023/11/us-cybersecurity-agencies-warn-of.html
π19π₯4π2π€1
πβ οΈ WARNING for Python Devs!
π¦ 27 FAKE packages found on PyPI.
π΅οΈββοΈ Masquerading as legit, downloaded thousands of times.
Learn how they embed malware in images using steganography.
π Read more: https://thehackernews.com/2023/11/27-malicious-pypi-packages-with.html
π¦ 27 FAKE packages found on PyPI.
π΅οΈββοΈ Masquerading as legit, downloaded thousands of times.
Learn how they embed malware in images using steganography.
π Read more: https://thehackernews.com/2023/11/27-malicious-pypi-packages-with.html
π₯23π€―20π7π€7π2β‘1
β‘ FCC enforces new regulation:
π Wireless providers MUST now authenticate you before transferring phone numbers. Why? To SHIELD you from SIM-swapping attacks and port-out frauds.
Learn more: https://thehackernews.com/2023/11/fcc-enforces-stronger-rules-to-protect.html
π Wireless providers MUST now authenticate you before transferring phone numbers. Why? To SHIELD you from SIM-swapping attacks and port-out frauds.
Learn more: https://thehackernews.com/2023/11/fcc-enforces-stronger-rules-to-protect.html
π26π6π₯5π3
β οΈ Operation SEO#LURKER: Cybercriminals are using fake Google ads to trick users searching for software like WinSCP into downloading #malware.
Read details: https://thehackernews.com/2023/11/beware-malicious-google-ads-trick.html
Read details: https://thehackernews.com/2023/11/beware-malicious-google-ads-trick.html
π33β‘6π5π₯4π€―4π2
Russian cyber espionage group linked to the FSB are using a USB worm called LitterDrifter to target Ukrainian organizations.
It spreads malware via USB drives & communicates with C&C servers.
Learn more about this threat: https://thehackernews.com/2023/11/russian-cyber-espionage-group-deploys.html
It spreads malware via USB drives & communicates with C&C servers.
Learn more about this threat: https://thehackernews.com/2023/11/russian-cyber-espionage-group-deploys.html
π27π₯9π€7π5π1
Researchers report a surge in attacks by the 8Base ransomware group, using Phobos variants.
This group has been active since March 2022, and now relies more on SmokeLoader for distributing ransomware.
Learn more: https://thehackernews.com/2023/11/8base-group-deploying-new-phobos.html
This group has been active since March 2022, and now relies more on SmokeLoader for distributing ransomware.
Learn more: https://thehackernews.com/2023/11/8base-group-deploying-new-phobos.html
π24π₯6π€―4π±1
Indian Hack-for-Hire group targeted U.S., China, Pakistan, and more for over a decade. They stole sensitive data from high-value individuals/organizations using spyware and exploits (reportedly) from vendors like Vervata and Vupen.
Read: https://thehackernews.com/2023/11/indian-hack-for-hire-group-targeted-us.html
Read: https://thehackernews.com/2023/11/indian-hack-for-hire-group-targeted-us.html
π€―17π8π₯7π6π4π±1
π¨ Bitcoin wallets created from 2011 to 2015 vulnerable to "Randstorm" exploit, potentially allowing unauthorized access by recovering passwords.
Learn more: https://thehackernews.com/2023/11/randstorm-exploit-bitcoin-wallets.html
Learn more: https://thehackernews.com/2023/11/randstorm-exploit-bitcoin-wallets.html
π€21π8π7π€―2
πβ οΈπ» New LummaC2 malware version is using trigonometry-based tactic to differentiate between users and security systems, evading sandboxes and security analyses.
Learn more: https://thehackernews.com/2023/11/lummac2-malware-deploys-new.html
Learn more: https://thehackernews.com/2023/11/lummac2-malware-deploys-new.html
π₯23π9
New high-volume phishing campaigns mimic tactics of defunct QakBot trojan, hijacking email threads and using unique URLs to deliver DarkGate and PikaBot malware.
Learn more: https://thehackernews.com/2023/11/darkgate-and-pikabot-malware-resurrect.html
Learn more: https://thehackernews.com/2023/11/darkgate-and-pikabot-malware-resurrect.html
π₯10π5
π¨ Threat Alert: Hackers are using NetSupport RAT to target education, government, and business services. Delivery methods include fraudulent updates, drive-by downloads, malware loaders, and phishing campaigns.
Learn more https://thehackernews.com/2023/11/netsupport-rat-infections-on-rise.html
Learn more https://thehackernews.com/2023/11/netsupport-rat-infections-on-rise.html
π21β‘3
Mustang Panda, a Chinese cyber actor, linked to a cyber attack on a Philippines government entity amidst rising tensions over the disputed South China Sea.
Find out more in this report: https://thehackernews.com/2023/11/mustang-panda-hackers-targets.html
Find out more in this report: https://thehackernews.com/2023/11/mustang-panda-hackers-targets.html
π19π₯4π€2
π± Alert: Android users in India, beware! Hackers are distributing fake banking and government apps to steal sensitive data like bank info and personal details.
Learn more: https://thehackernews.com/2023/11/malicious-apps-disguised-as-banks-and.html
Learn more: https://thehackernews.com/2023/11/malicious-apps-disguised-as-banks-and.html
π15π13π₯6π4
Phishing attacks are getting smarter! Cybercriminals are now using QR codes, CAPTCHAs, and steganography to trick victims.
Learn how to spot the signs and protect yourself from credential theft.
Read: https://thehackernews.com/2023/11/how-multi-stage-phishing-attacks.html
Learn how to spot the signs and protect yourself from credential theft.
Read: https://thehackernews.com/2023/11/how-multi-stage-phishing-attacks.html
π₯16π±6π3π2
π‘οΈ A new variant of Agent Tesla malware has emerged, delivered via ZPAQ compression format, making detection challenging. It's harvesting data from email clients and 40 web browsers.
Learn more: https://thehackernews.com/2023/11/new-agent-tesla-malware-variant-using.html
Learn more: https://thehackernews.com/2023/11/new-agent-tesla-malware-variant-using.html
π14π₯6
π‘οΈπ» Identity-based attacks like lateral movement & ransomware are increasing.
Discover how Silverfort's Unified Identity Protection platform provides real-time security against such threats.
Don't just read about it, see it in action here: https://thehackernews.com/2023/11/product-walkthrough-silverforts-unified.html
Discover how Silverfort's Unified Identity Protection platform provides real-time security against such threats.
Don't just read about it, see it in action here: https://thehackernews.com/2023/11/product-walkthrough-silverforts-unified.html
π12β‘5π€―2
Play ransomware has turned into Ransomware-as-a-Service (RaaS), allowing other cybercriminals to use it.
Operators offering a complete packageβdocumentation, forums, technical support, and even help with negotiating ransoms.
Read: https://thehackernews.com/2023/11/play-ransomware-goes-commercial-now.html
Operators offering a complete packageβdocumentation, forums, technical support, and even help with negotiating ransoms.
Read: https://thehackernews.com/2023/11/play-ransomware-goes-commercial-now.html
π16π±12π9π€4π3
π Critical Security Alert: Threat actors, including LockBit ransomware affiliates, exploit the Citrix NetScaler flaw ("Citrix Bleed") to hijack user sessions and gain unauthorized access.
Learn more in this article: https://thehackernews.com/2023/11/lockbit-ransomware-exploiting-critical.html
Learn more in this article: https://thehackernews.com/2023/11/lockbit-ransomware-exploiting-critical.html
π₯13π7
π¨ macOS users beware! Atomic Stealer, a $1,000/month malware, is now spreading through deceptive web browser updates via ClearFake.
Find out how it infiltrates your device through compromised websites: https://thehackernews.com/2023/11/clearfake-campaign-expands-to-deliver.html
Find out how it infiltrates your device through compromised websites: https://thehackernews.com/2023/11/clearfake-campaign-expands-to-deliver.html
π14π₯6π4
β οΈ North Korean hackers posing as recruiters infect software developers with cross-platform malware named "BeaverTail" and "InvisibleFerret," targeting Windows, Linux, and macOS systems during fake interviews.
Learn more: https://thehackernews.com/2023/11/north-korean-hackers-pose-as-job.html
Learn more: https://thehackernews.com/2023/11/north-korean-hackers-pose-as-job.html
π₯20π6π€―5π±1