Microsoft Uncovers Banking AitM Phishing and BEC Attacks Targeting Financial Giants
The Hacker News
by
7h ago
Banking and financial services organizations are the targets of a new multi-stage adversary-in-the-middle (AitM) phishing and business email compromise (BEC) attack, Microsoft has revealed. "The attack originated from a compromised trusted vendor and transitioned into a series of AiTM attacks and follow-on BEC activity spanning multiple organizations," the tech giant disclosed in a Thursday ..read more
Visit website
Asylum Ambuscade: A Cybercrime Group with Espionage Ambitions
The Hacker News
by
9h ago
The threat actor known as Asylum Ambuscade has been observed straddling cybercrime and cyber espionage operations since at least early 2020. "It is a crimeware group that targets bank customers and cryptocurrency traders in various regions, including North America and Europe," ESET said in an analysis published Thursday. "Asylum Ambuscade also does espionage against government entities in Europe ..read more
Visit website
5 Reasons Why Access Management is the Key to Securing the Modern Workplace
The Hacker News
by
11h ago
The way we work has undergone a dramatic transformation in recent years. We now operate within digital ecosystems, where remote work and the reliance on a multitude of digital tools is the norm rather than the exception. This shift – as you likely know from your own life – has led to superhuman levels of productivity that we wouldn't ever want to give up. But moving fast comes at a cost. And for ..read more
Visit website
Stealth Soldier: A New Custom Backdoor Targets North Africa with Espionage Attacks
The Hacker News
by
15h ago
A new custom backdoor dubbed Stealth Soldier has been deployed as part of a set of highly-targeted espionage attacks in North Africa. "Stealth Soldier malware is an undocumented backdoor that primarily operates surveillance functions such as file exfiltration, screen and microphone recording, keystroke logging and stealing browser information," cybersecurity company Check Point said in a ..read more
Visit website
Experts Unveil Exploit for Recent Windows Vulnerability Under Active Exploitation
The Hacker News
by
1d ago
Details have emerged about a now-patched actively exploited security flaw in Microsoft Windows that could be abused by a threat actor to gain elevated privileges on affected systems. The vulnerability, tracked as CVE-2023-29336, is rated 7.8 for severity and concerns an elevation of privilege bug in the Win32k component. "An attacker who successfully exploited this vulnerability could gain ..read more
Visit website
Clop Ransomware Gang Likely Exploiting MOVEit Transfer Vulnerability Since 2021
The Hacker News
by
1d ago
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI) have published a joint advisory regarding the active exploitation of a recently disclosed critical flaw in Progress Software's MOVEit Transfer application to drop ransomware. "The Cl0p Ransomware Gang, also known as TA505, reportedly began exploiting a previously unknown SQL injection ..read more
Visit website
How to Improve Your API Security Posture
The Hacker News
by
1d ago
APIs, more formally known as application programming interfaces, empower apps and microservices to communicate and share data. However, this level of connectivity doesn't come without major risks. Hackers can exploit vulnerabilities in APIs to gain unauthorized access to sensitive data or even take control of the entire system. Therefore, it's essential to have a robust API security posture to ..read more
Visit website
Urgent Security Updates: Cisco and VMware Address Critical Vulnerabilities
The Hacker News
by
2d ago
VMware has released security updates to fix a trio of flaws in Aria Operations for Networks that could result in information disclosure and remote code execution. The most critical of the three vulnerabilities is a command injection vulnerability tracked as CVE-2023-20887 (CVSS score: 9.8) that could allow a malicious actor with network access to achieve remote code execution. Also patched by ..read more
Visit website
Kimsuky Targets Think Tanks and News Media with Social Engineering Attacks
The Hacker News
by
2d ago
The North Korean nation-state threat actor known as Kimsuky has been linked to a social engineering campaign targeting experts in North Korean affairs with the goal of stealing Google credentials and delivering reconnaissance malware. "Further, Kimsuky's objective extends to the theft of subscription credentials from NK News," cybersecurity firm SentinelOne said in a report shared with The ..read more
Visit website
Barracuda Urges Immediate Replacement of Hacked ESG Appliances
The Hacker News
by
2d ago
Enterprise security company Barracuda is now urging customers who were impacted by a recently disclosed zero-day flaw in its Email Security Gateway (ESG) appliances to immediately replace them. "Impacted ESG appliances must be immediately replaced regardless of patch version level," the company said in an update, adding its "remediation recommendation at this time is full replacement of the ..read more
Visit website

Follow The Hacker News on FeedSpot

Continue with Google
Continue with Apple
OR