Thursday, March 31, 2022

New Malware Loader 'Verblecon' Infects Hacked PCs with Cryptocurrency Miners

The Hacker News Daily Updates
Newsletter
cover

Privacy, Regulations, and Cybersecurity: The Essential Business Guide ($27.00 Value) FREE for a Limited Time

Protect business value, stay compliant with global regulations, and meet stakeholder demands with this privacy how-to

Download Now Sponsored
LATEST NEWS Mar 31, 2022

Bugs in Wyze Cams Could Let Attackers Takeover Devices and Access Video Feeds

Three security vulnerabilities have been disclosed in the popular Wyze Cam devices that grant malicious actors to execute arbitrary code and access camera feeds as well as unauthorizedly read the SD cards, the latter of which remained unresolved for nearly three years after the initial discovery. ...

Read More
Twitter Facebook LinkedIn

New Python-based Ransomware Targeting JupyterLab Web Notebooks

Researchers have disclosed what they say is the first-ever Python-based ransomware strain specifically designed to target exposed Jupyter notebooks, a web-based interactive computing platform that allows editing and running programs via a browser. "The attackers gained initial access via ...

Read More
Twitter Facebook LinkedIn

Hackers Increasingly Using 'Browser-in-the-Browser' Technique in Ukraine Related Attacks

A Belarusian threat actor known as Ghostwriter (aka UNC1151) has been spotted leveraging the recently disclosed browser-in-the-browser (BitB) technique as part of their credential phishing campaigns exploiting the ongoing Russo-Ukrainian conflict. The method, which masquerades as a legitimate ...

Read More
Twitter Facebook LinkedIn

Unpatched Java Spring Framework 0-Day RCE Bug Threatens Enterprise Web Apps Security

A zero-day remote code execution (RCE) vulnerability has come to light in the Spring framework shortly after a Chinese security researcher briefly leaked a proof-of-concept (PoC) exploit on GitHub before deleting their account. According to cybersecurity firm Praetorian, the unpatched flaw impacts ...

Read More
Twitter Facebook LinkedIn

QNAP Warns of OpenSSL Infinite Loop Vulnerability Affecting NAS Devices

Taiwanese company QNAP this week revealed that a selected number of its network-attached storage (NAS) appliances are affected by a recently-disclosed bug in the open-source OpenSSL cryptographic library. "An infinite loop vulnerability in OpenSSL has been reported to affect certain QNAP NAS," the ...

Read More
Twitter Facebook LinkedIn
cover

Privacy, Regulations, and Cybersecurity: The Essential Business Guide ($27.00 Value) FREE for a Limited Time

Protect business value, stay compliant with global regulations, and meet stakeholder demands with this privacy how-to

Download Now Sponsored

This email was sent to myemailku.ghdbrevo2018@blogger.com. You are receiving this newsletter because you opted-in to receive relevant communications from The Hacker News. To manage your email newsletter preferences, please click here.

Contact The Hacker News: info@thehackernews.com
Unsubscribe

The Hacker News | Pearls Omaxe, Netaji Subash Place, Pitampura, Delhi 110034 India

Wednesday, March 30, 2022

DevOps Adoption Strategies: Principles, Processes, Tools, and Trends ($34.99 Value) FREE for a Limited Time

The Hacker News eBook Update
Newsletter
DevOps Adoption Strategies: Principles, Processes, Tools, and Trends ($34.99 Value) FREE for a Limited Time
Download For Free
DevOps is a set of best practices enabling operations and development teams to work together to produce higher-quality work and, among other things, quicker releases.

Download your free resource now >
Request
This email was sent to myemailku.ghdbrevo2018@blogger.com. You are receiving this newsletter because you opted-in to receive relevant communications from The Hacker News. To manage your email newsletter preferences, please click here.

Contact The Hacker News: info@thehackernews.com
Unsubscribe

The Hacker News | Pearls Omaxe, Netaji Subash Place, Pitampura, Delhi 110034 India

New Malware Loader 'Verblecon' Infects Hacked PCs with Cryptocurrency Miners

The Hacker News Daily Updates
Newsletter
cover

Mastering Linux Security and Hardening - Free Sample Chapters

A comprehensive guide to mastering the art of preventing your Linux system from getting compromised.

Download Now Sponsored
LATEST NEWS Mar 30, 2022

Researchers Expose Mars Stealer Malware Campaign Using Google Ads to Spread

A nascent information stealer called Mars has been observed in campaigns that take advantage of cracked versions of the malware to steal information stored in web browsers and cryptocurrency wallets. "Mars Stealer is being distributed via social engineering techniques, malspam campaigns, malicious ...

Read More
Twitter Facebook LinkedIn

Honda's Keyless Access Bug Could Let Thieves Remotely Unlock and Start Vehicles

A duo of researchers has released a proof-of-concept (PoC) demonstrating the ability for a malicious actor to remote lock, unlock, and even start Honda and Acura vehicles by means of what's called a replay attack. The attack is made possible, thanks to a vulnerability in its remote keyless system ...

Read More
Twitter Facebook LinkedIn

Improve Your Hacking Skills with 9 Python Courses for Just $39

For anyone with interest in cybersecurity, learning Python is a must. The language is used extensively in white hat hacking, and professionals use Python scripts to automate tests. It also has a use in the "soft" side of cybersecurity — like scraping the web for compromised data and detecting ...

Read More
Twitter Facebook LinkedIn

LAPSUS$ Claims to Have Breached IT Firm Globant; Leaks 70GB of Data

The LAPSUS$ data extortion gang announced their return on Telegram after a week-long "vacation," leaking what they claim is data from software services company Globant. "We are officially back from a vacation," the group wrote on their Telegram channel – which has nearly around 54,000 members as ...

Read More
Twitter Facebook LinkedIn

CISA Warns of Ongoing Cyber Attacks Targeting Internet-Connected UPS Devices

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the Department of Energy (DoE) are jointly warning of attacks against internet-connected uninterruptible power supply (UPS) devices by means of default usernames and passwords. "Organizations can mitigate attacks against their ...

Read More
Twitter Facebook LinkedIn
cover

Mastering Linux Security and Hardening - Free Sample Chapters

A comprehensive guide to mastering the art of preventing your Linux system from getting compromised.

Download Now Sponsored

This email was sent to myemailku.ghdbrevo2018@blogger.com. You are receiving this newsletter because you opted-in to receive relevant communications from The Hacker News. To manage your email newsletter preferences, please click here.

Contact The Hacker News: info@thehackernews.com
Unsubscribe

The Hacker News | Pearls Omaxe, Netaji Subash Place, Pitampura, Delhi 110034 India