Hackers


Warning: Creating default object from empty value in /home/cyberbu/public_html/wp/wp-content/plugins/rss-import/rssimport.php on line 490

Warning: Creating default object from empty value in /home/cyberbu/public_html/wp/wp-content/plugins/rss-import/rssimport.php on line 490

Warning: Creating default object from empty value in /home/cyberbu/public_html/wp/wp-content/plugins/rss-import/rssimport.php on line 490

Warning: Creating default object from empty value in /home/cyberbu/public_html/wp/wp-content/plugins/rss-import/rssimport.php on line 490

Warning: Creating default object from empty value in /home/cyberbu/public_html/wp/wp-content/plugins/rss-import/rssimport.php on line 490

Retour à Sécurité

Security Affairs

    • 26 mai 2024Security Affairs newsletter Round 473 by Pierluigi Paganini – INTERNATIONAL EDITION
      A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs are free for you in your email box. Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press. Fake AV websites used to distribute info-stealer malwareMITRE December 2023 attack: Threat actors created rogue VMs to evade detectionAn XSS flaw i …

    • 26 mai 2024Malware-laced JAVS Viewer deploys RustDoor implant in supply chain attack
      Malicious actors compromised the JAVS Viewer installer to deliver the RustDoor malware in a supply chain attack. Rapid7 researchers warned that threat actors added a backdoor to the installer for the Justice AV Solutions JAVS Viewer software. The attackers were able to inject a backdoor in the JAVS Viewer v8.3.7 installer that is being distributed from the JAVS’ servers. Justice AV Solutions (JAVS …

    • 25 mai 2024Fake AV websites used to distribute info-stealer malware
      Threat actors used fake AV websites masquerading as legitimate antivirus products from Avast, Bitdefender, and Malwarebytes to distribute malware. In mid-April 2024, researchers at Trellix Advanced Research Center team spotted multiple fake AV sites used to distribute info-stealers. The malicious websites hosted sophisticated malicious files such as APK, EXE and Inno setup installer, including Spy …

    • 25 mai 2024MITRE December 2023 attack: Threat actors created rogue VMs to evade detection
      The MITRE Corporation revealed that threat actors behind the December 2023 attacks created rogue virtual machines (VMs) within its environment. The MITRE Corporation has provided a new update about the December 2023 attack. In April 2024, MITRE disclosed a security breach in one of its research and prototyping networks. The security team at the organization promptly launched an investigation, logg …

    • 24 mai 2024An XSS flaw in GitLab allows attackers to take over accounts
      GitLab addressed a high-severity cross-site scripting (XSS) vulnerability that allows unauthenticated attackers to take over user accounts. GitLab fixed a high-severity XSS vulnerability, tracked as CVE-2024-4835, that allows attackers to take over user accounts. An attacker can exploit this issue by using a specially crafted page to exfiltrate sensitive user information. The vulnerability impacts …

    • 24 mai 2024Google fixes eighth actively exploited Chrome zero-day this year, the third in a month
      Google rolled out a new emergency security update to fix another actively exploited zero-day vulnerability in the Chrome browser. Google has released a new emergency security update to address a new vulnerability, tracked as CVE-2024-5274, in the Chrome browser, it is the eighth zero-day exploited in attacks disclosed this year. The vulnerability is a high-severity ‘type confusion’ in …

    • 24 mai 2024CISA adds Apache Flink flaw to its Known Exploited Vulnerabilities catalog
      CISA adds Apache Flink improper access control vulnerability to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a NextGen Healthcare Mirth Connect vulnerability to its Known Exploited Vulnerabilities (KEV) catalog. The issue, tracked as CVE-2020-17519, is an improper access control vulnerability in Apache Flink. Apache Flink conta …

    • 24 mai 2024Usage of TLS in DDNS Services leads to Information Disclosure in Multiple Vendors
      The use of Dynamic DNS (DDNS) services embedded in appliances can potentially expose data and devices to attacks. The use of Dynamic DNS (DDNS) services embedded in appliances, such as those provided by vendors like Fortinet or QNAP, carries cybersecurity implications. It increases the discoverability of customer devices by attackers. Advisory on security impacts related to the use of TLS in propr …

    • 24 mai 2024Recall feature in Microsoft Copilot+ PCs raises privacy and security concerns
      UK data watchdog is investigating Microsoft regarding the new Recall feature in Copilot+ PCs that captures screenshots of the user’s laptop every few seconds. The UK data watchdog, the Information Commissioner’s Office (ICO), is investigating a new feature, called Recall, implemented by Microsoft” Copilot+ PCs that captures screenshots of the user’s laptop every few seconds …

    • 23 mai 2024APT41: The threat of KeyPlug against Italian industries
      Tinexta Cyber’s Zlab Malware Team uncovered a backdoor known as KeyPlug employed in attacks against several Italian industries During an extensive investigation, Tinexta Cyber’s Zlab Malware Team uncovered a backdoor known as KeyPlug, which hit for months a variety of Italian industries. This backdoor is attributed to the arsenal of APT41,a group whose origin is tied to China. APT41, known also as …

The Hackers News

    • 25 mai 2024Experts Find Flaw in Replicate AI Service Exposing Customers' Models and Data
      Cybersecurity researchers have discovered a critical security flaw in an artificial intelligence (AI)-as-a-service provider Replicate that could have allowed threat actors to gain access to proprietary AI models and sensitive information. « Exploitation of this vulnerability would have allowed unauthorized access to the AI prompts and results of all Replicate’s platform customers, »

    • 24 mai 2024Hackers Created Rogue VMs to Evade Detection in Recent MITRE Cyber Attack
      The MITRE Corporation has revealed that the cyber attack targeting the not-for-profit company towards late December 2023 by exploiting zero-day flaws in Ivanti Connect Secure (ICS) involved the threat actor creating rogue virtual machines (VMs) within its VMware environment. « The adversary created their own rogue VMs within the VMware environment, leveraging compromised vCenter Server access, »

    • 24 mai 2024Beware: These Fake Antivirus Sites Spreading Android and Windows Malware
      Threat actors have been observed making use of fake websites masquerading as legitimate antivirus solutions from Avast, Bitdefender, and Malwarebytes to propagate malware capable of stealing sensitive information from Android and Windows devices. « Hosting malicious software through sites which look legitimate is predatory to general consumers, especially those who look to protect their devices

    • 24 mai 2024How Do Hackers Blend In So Well? Learn Their Tricks in This Expert Webinar
      Don’t be fooled into thinking that cyber threats are only a problem for large organizations. The truth is that cybercriminals are increasingly targeting smaller businesses, and they’re getting smarter every day. Join our FREE webinar « Navigating the SMB Threat Landscape: Key Insights from Huntress’ Threat Report, » in which Jamie Levy — Director of Adversary Tactics at Huntress, a renowned

    • 24 mai 2024DevOps Dilemma: How Can CISOs Regain Control in the Age of Speed?
      Introduction The infamous Colonial pipeline ransomware attack (2021) and SolarWinds supply chain attack (2020) were more than data leaks; they were seismic shifts in cybersecurity. These attacks exposed a critical challenge for Chief Information Security Officers (CISOs): holding their ground while maintaining control over cloud security in the accelerating world of DevOps.

    • 24 mai 2024Update Chrome Browser Now: 4th Zero-Day Exploit Discovered in May 2024
      Google on Thursday rolled out fixes to address a high-severity security flaw in its Chrome browser that it said has been exploited in the wild. Assigned the CVE identifier CVE-2024-5274, the vulnerability relates to a type confusion bug in the V8 JavaScript and WebAssembly engine. It was reported by Clément Lecigne of Google’s Threat Analysis Group and Brendon Tiszka of

    • 24 mai 2024JAVS Courtroom Recording Software Backdoored – Deploys RustDoor Malware
      Malicious actors have backdoored the installer associated with courtroom video recording software developed by Justice AV Solutions (JAVS) to deliver malware that’s associated with a known implant called RustDoor. The software supply chain attack, tracked as CVE-2024-4978 (CVSS score: 8.7), impacts JAVS Viewer v8.3.7, a component of the JAVS Suite 8 that allows users to create,

    • 24 mai 2024Stealthy BLOODALCHEMY Malware Targeting ASEAN Government Networks
      Cybersecurity researchers have discovered that the malware known as BLOODALCHEMY used in attacks targeting government organizations in Southern and Southeastern Asia is in fact an updated version of Deed RAT, which is believed to be a successor to ShadowPad. « The origin of BLOODALCHEMY and Deed RAT is ShadowPad and given the history of ShadowPad being utilized in numerous APT

    • 23 mai 2024Ransomware Attacks Exploit VMware ESXi Vulnerabilities in Alarming Pattern
      Ransomware attacks targeting VMware ESXi infrastructure follow an established pattern regardless of the file-encrypting malware deployed, new findings show. « Virtualization platforms are a core component of organizational IT infrastructure, yet they often suffer from inherent misconfigurations and vulnerabilities, making them a lucrative and highly effective target for threat actors to abuse, »

    • 23 mai 2024CISA Warns of Actively Exploited Apache Flink Security Vulnerability
      The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a security flaw impacting Apache Flink, an open-source, unified stream-processing and batch-processing framework, to the Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. Tracked as CVE-2020-17519, the issue relates to a case of improper access control that

Dark Reading
Erreur: Il y a un erreur avec ce flux.

WeLiveSecurity
Erreur: Il y a un erreur avec ce flux.

Threatpost

E Hacking News | Latest Hacker News and IT Security News
Erreur: Il y a un erreur avec ce flux.

TechWorm
Aucun contenu.

GBHackers On Security

    • 24 mai 2024Hackers Weaponizing Microsoft Access Documents To Execute Malicious Program
      In multiple aggressive phishing attempts, the financially motivated organization UAC-0006 heavily targeted Ukraine, utilizing ZIP and RAR attachments to distribute SMOKELOADER malware. The most recent attacks involve emails that carry Microsoft Access files and ZIP archives that, when opened, install weaponized malware on compromised systems, such as RMS and TALESHOT. The government computer emerg …

    • 24 mai 2024Microsoft Warns Of Storm-0539’s Aggressive Gift Card Theft
      Gift cards are attractive to hackers since they provide quick monetization for stolen data or compromised systems. Reselling gift cards is simple, and they can also be converted into money, which makes them a comparatively risk-free means of ensuring threat actors benefit greatly from their illegal undertakings. Microsoft cybersecurity analysts recently discovered that the gift card system is targ …

    • 24 mai 2024Kinsing Malware Attacking Apache Tomcat Server With Vulnerabilities
      The scalability and flexibility of cloud platforms recently boosted the emerging trend of cryptomining attacks in the cloud. Unlike on-premises infrastructure, whereby it is difficult to scale up resources, cloud environments enable attackers to deploy resources for cryptomining rapidly, making exploitation easier.  One of the most common threats of cloud cryptomining is “Kinsing malware. …

    • 24 mai 2024NSA Releases Guidance On Zero Trust Maturity To Secure Application From Attackers
      Zero Trust Maturity measures the extent to which an organization has adopted and implemented the Zero Trust security model.  It calculates how fully a company has adopted Zero Trust’s foundational concepts, such as stringent authentication of each user, device, and application. Recently, the NSA released guidance on Zero Trust Maturity to secure the application from attackers. Guidance On Zero Tru …

    • 24 mai 2024Chinese Hackers Stay Hidden On Military And Government Networks For Six Years
      Hackers target military and government networks for varied reasons, primarily related to spying, which involves interference in the functioning of critical infrastructure.  This is mainly because these networks hold sensitive data and command systems that if tampered with can be a great blow to national security through the collection of intelligence information or even gaining an upper hand …

Cyber Defense Magazine
Erreur: Il y a un erreur avec ce flux.

blackMORE Ops

    • 5 mars 2024Whispers: A Powerful Static Code Analysis Tool for Credential Detection
      “My little birds are everywhere, even in the North, they whisper to me the strangest stories.” – Lord Varys Meet Whispers, an advanced static code analysis tool meticulously designed to parse various common data formats, unveiling hardcoded credentials, and identifying potentially hazardous functions. Whispers seamlessly integrates into both the command-line interface (CLI) and y …

    • 5 mars 2024Enabling AMD GPU for Hashcat on Kali Linux: A Quick Guide
      If you’ve encountered an issue where Hashcat initially only recognizes your CPU and not the GPU, this guide can help you enable your AMD RX570 GPU for accelerated hashing. Here’s a streamlined version of the steps you took: Initial Setup: Running hashcat -I initially only detected the CPU. Download AMD Drivers: Visit the official AMD … The post Enabling AMD GPU for Hashcat on Kal …

    • 5 mars 2024Identifying harmful activity on your captured traffic
      This Python script utilises Wireshark or TCPdump to analyse network traffic stored in a specified .pcap or .pcapng file. The objective is to detect potential malicious activities and attacks. The script covers a range of suspicious network behaviors, including: DNS Tunneling SSH Tunneling TCP Session Hijacking SMB Attack SMTP or DNS Attack IPv6 Fragmentation Attack … The post Identifying har …

    • 20 mai 2023Nyxt: Hacker’s Dream Browser
      In the ever-evolving digital landscape, the demand for specialized tools and platforms has grown exponentially. For hackers and technology enthusiasts, having a browser that caters to their unique needs and empowers their capabilities is crucial. Enter Nyxt, an innovative and versatile web browser designed specifically with hackers in mind. With its rich feature set, customizable … The post …

    • 19 mai 2023Migrate Plex Server – Ubuntu
      To migrate your Plex server to a new Ubuntu server, you can follow these steps: 1. Set up the new Ubuntu server: Install Ubuntu on the new server and ensure that it is up to date with the latest updates and packages. 2. Install Plex Media Server: On the new Ubuntu server, download and install … The post Migrate Plex Server – Ubuntu appeared first on blackMORE Ops. …

Hacker Ritz
Erreur: Il y a un erreur avec ce flux.