Wednesday, September 14, 2022

Hackers Using New Linux Variant of SideWalk Backdoor

The Hacker News Daily Updates
Newsletter
cover

The Top 4 Cybersecurity Threats of 2022

And how to reduce your organization's risks.

Download Now Sponsored
LATEST NEWS Sep 14, 2022

Lorenz Ransomware Exploit Mitel VoIP Systems to Breach Business Networks

The operators behind the Lornenz ransomware operation have been observed exploiting a now-patched critical security flaw in Mitel MiVoice Connect to obtain a foothold into target environments for follow-on malicious activities. "Initial malicious activity originated from a Mitel appliance sitting ...

Read More
Twitter Facebook LinkedIn

SparklingGoblin APT Hackers Using New Linux Variant of SideWalk Backdoor

A Linux variant of a backdoor known as SideWalk was used to target a Hong Kong university in February 2021, underscoring the cross-platform abilities of the implant.  Slovak cybersecurity firm ESET, which detected the malware in the university's network, attributed the backdoor to a nation-state ...

Read More
Twitter Facebook LinkedIn

Free Learnk8s Virtual Lab Series: Scaling apps, nodes, clusters

Learn how to optimize costs by reducing fleet size, configure your cluster autoscaler, and deploy workloads across clusters in this 3-part live training series. Includes write-ups, scripts, and code examples. Lab #1 kicks off 9/21. Reserve your seat ...

Read More
Twitter Facebook LinkedIn

How to Do Malware Analysis?

Based on the findings of Malwarebytes' Threat Review for 2022, 40 million Windows business computers' threats were detected in 2021. In order to combat and avoid these kinds of attacks, malware analysis is essential. In this article, we will break down the goal of malicious programs' investigation ...

Read More
Twitter Facebook LinkedIn

Researchers Detail OriginLogger RAT — Successor to Agent Tesla Malware

Palo Alto Networks Unit 42 has detailed the inner workings of a malware called OriginLogger, which has been touted as a successor to the widely used information stealer and remote access trojan (RAT) known as Agent Tesla. A .NET based keylogger and remote access, Agent Tesla has had a ...

Read More
Twitter Facebook LinkedIn
cover

The Top 4 Cybersecurity Threats of 2022

And how to reduce your organization's risks.

Download Now Sponsored

This email was sent to myemailku.ghdbrevo2018@blogger.com. You are receiving this newsletter because you opted-in to receive relevant communications from The Hacker News. To manage your email newsletter preferences, please click here.

Contact The Hacker News: info@thehackernews.com
Unsubscribe

The Hacker News | Pearls Omaxe, Netaji Subash Place, Pitampura, Delhi 110034 India

0 Comments:

Post a Comment

Subscribe to Post Comments [Atom]

<< Home