Microsoft Outlook Flaw Exploited by Russia's APT28 to Hack Czech, German Entities
The Hacker News
by
18h ago
Czechia and Germany on Friday revealed that they were the target of a long-term cyber espionage campaign conducted by the Russia-linked nation-state actor known as APT28, drawing condemnation from the European Union (E.U.), the North Atlantic Treaty Organization (NATO), the U.K., and the U.S. The Czech Republic's Ministry of Foreign Affairs (MFA), in a statement, said some unnamed ..read more
Visit website
Hackers Increasingly Abusing Microsoft Graph API for Stealthy Malware Communications
The Hacker News
by
1d ago
Threat actors have been increasingly weaponizing Microsoft Graph API for malicious purposes with the aim of evading detection. This is done to "facilitate communications with command-and-control (C&C) infrastructure hosted on Microsoft cloud services," the Symantec Threat Hunter Team, part of Broadcom, said in a report shared with The Hacker News ..read more
Visit website
NSA, FBI Alert on N. Korean Hackers Spoofing Emails from Trusted Sources
The Hacker News
by
2d ago
The U.S. government on Thursday published a new cybersecurity advisory warning of North Korean threat actors' attempts to send emails in a manner that makes them appear like they are from legitimate and trusted parties. The joint bulletin was published by the National Security Agency (NSA), the Federal Bureau of Investigation (FBI), and the Department of State. "The ..read more
Visit website
Google Announces Passkeys Adopted by Over 400 Million Accounts
The Hacker News
by
2d ago
Google on Thursday announced that passkeys are being used by over 400 million Google accounts, authenticating users more than 1 billion times over the past two years. "Passkeys are easy to use and phishing resistant, only relying on a fingerprint, face scan or a pin making them 50% faster than passwords," Heather Adkins, vice president of security engineering at Google, said ..read more
Visit website
Four Critical Vulnerabilities Expose HPE Aruba Devices to RCE Attacks
The Hacker News
by
2d ago
HPE Aruba Networking (formerly Aruba Networks) has released security updates to address critical flaws impacting ArubaOS that could result in remote code execution (RCE) on affected systems. Of the 10 security defects, four are rated critical in severity - CVE-2024-26304 (CVSS score: 9.8) - Unauthenticated Buffer Overflow Vulnerability in the L2/L3 Management Service Accessed via ..read more
Visit website
Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw
The Hacker News
by
2d ago
Several popular Android applications available in Google Play Store are susceptible to a path traversal-affiliated vulnerability that could be exploited by a malicious app to overwrite arbitrary files in the vulnerable app's home directory. "The implications of this vulnerability pattern include arbitrary code execution and token theft, depending on an application’s&nbsp ..read more
Visit website
Ukrainian REvil Hacker Sentenced to 13 Years and Ordered to Pay $16 Million
The Hacker News
by
3d ago
A Ukrainian national has been sentenced to more than 13 years in prison and ordered to pay $16 million in restitution for carrying out thousands of ransomware attacks and extorting victims. Yaroslav Vasinskyi (aka Rabotnik), 24, along with his co-conspirators part of the REvil ransomware group orchestrated more than 2,500 ransomware attacks and demanded ransom payments in ..read more
Visit website
When is One Vulnerability Scanner Not Enough?
The Hacker News
by
3d ago
Like antivirus software, vulnerability scans rely on a database of known weaknesses. That’s why websites like VirusTotal exist, to give cyber practitioners a chance to see whether a malware sample is detected by multiple virus scanning engines, but this concept hasn’t existed in the vulnerability management space. The benefits of using multiple scanning engines Generally speaking ..read more
Visit website
Dropbox Discloses Breach of Digital Signature Service Affecting All Users
The Hacker News
by
3d ago
Cloud storage services provider Dropbox on Wednesday disclosed that Dropbox Sign (formerly HelloSign) was breached by unidentified threat actors, who accessed emails, usernames, and general account settings associated with all users of the digital signature product. The company, in a filing with the U.S. Securities and Exchange Commission (SEC), said it became aware of the ..read more
Visit website
New "Goldoon" Botnet Targets D-Link Routers With Decade-Old Flaw
The Hacker News
by
3d ago
A never-before-seen botnet called Goldoon has been observed targeting D-Link routers with a nearly decade-old critical security flaw with the goal of using the compromised devices for further attacks. The vulnerability in question is CVE-2015-2051 (CVSS score: 9.8), which affects D-Link DIR-645 routers and allows remote attackers to execute arbitrary ..read more
Visit website

Follow The Hacker News on FeedSpot

Continue with Google
Continue with Apple
OR