Hackers Exploit OpenMetadata Flaws to Mine Crypto on Kubernetes
The Hacker News | Cyber Security,Hacking News
by
26m ago
Threat actors are actively exploiting critical vulnerabilities in OpenMetadata to gain unauthorized access to Kubernetes workloads and leverage them for cryptocurrency mining activity. That's according to the Microsoft Threat Intelligence team, which said the flaws have been weaponized since the start of April 2024. OpenMetadata is an open-source platform that operates as a ..read more
Visit website
Russian APT Deploys New 'Kapeka' Backdoor in Eastern European Attacks
The Hacker News | Cyber Security,Hacking News
by
16h ago
A previously undocumented "flexible" backdoor called Kapeka has been "sporadically" observed in cyber attacks targeting Eastern Europe, including Estonia and Ukraine, since at least mid-2022. The findings come from Finnish cybersecurity firm WithSecure, which attributed the malware to the Russia-linked advanced persistent threat (APT) group tracked as Sandworm (aka APT44 or ..read more
Visit website
GenAI: A New Headache for SaaS Security Teams
The Hacker News | Cyber Security,Hacking News
by
19h ago
The introduction of Open AI’s ChatGPT was a defining moment for the software industry, touching off a GenAI race with its November 2022 release. SaaS vendors are now rushing to upgrade tools with enhanced productivity capabilities that are driven by generative AI. Among a wide range of uses, GenAI tools make it easier for developers to build software, assist sales teams in mundane email writing ..read more
Visit website
Critical Atlassian Flaw Exploited to Deploy Linux Variant of Cerber Ransomware
The Hacker News | Cyber Security,Hacking News
by
19h ago
Threat actors are exploiting unpatched Atlassian servers to deploy a Linux variant of Cerber (aka C3RB3R) ransomware. The attacks leverage CVE-2023-22518 (CVSS score: 9.1), a critical security vulnerability impacting the Atlassian Confluence Data Center and Server that allows an unauthenticated attacker to reset Confluence and create an administrator account. Armed with this access, a ..read more
Visit website
Hackers Exploit Fortinet Flaw, Deploy ScreenConnect, Metasploit in New Campaign
The Hacker News | Cyber Security,Hacking News
by
19h ago
Cybersecurity researchers have discovered a new campaign that's exploiting a recently disclosed security flaw in Fortinet FortiClient EMS devices to deliver ScreenConnect and Metasploit Powerfun payloads. The activity entails the exploitation of CVE-2023-48788 (CVSS score: 9.3), a critical SQL injection flaw that could permit an unauthenticated attacker to execute unauthorized code or ..read more
Visit website
Cisco Warns of Global Surge in Brute-Force Attacks Targeting VPN and SSH Services
The Hacker News | Cyber Security,Hacking News
by
23h ago
Cisco is warning about a global surge in brute-force attacks targeting various devices, including Virtual Private Network (VPN) services, web application authentication interfaces, and SSH services, since at least March 18, 2024. "These attacks all appear to be originating from TOR exit nodes and a range of other anonymizing tunnels and proxies," Cisco Talos said. Successful attacks could ..read more
Visit website
OpenJS Foundation Targeted in Potential JavaScript Project Takeover Attempt
The Hacker News | Cyber Security,Hacking News
by
2d ago
Security researchers have uncovered a "credible" takeover attempt targeting the OpenJS Foundation in a manner that evokes similarities to the recently uncovered incident aimed at the open-source XZ Utils project. "The OpenJS Foundation Cross Project Council received a suspicious series of emails with similar messages, bearing different names and overlapping GitHub-associated emails," OpenJS ..read more
Visit website
TA558 Hackers Weaponize Images for Wide-Scale Malware Attacks
The Hacker News | Cyber Security,Hacking News
by
2d ago
The threat actor tracked as TA558 has been observed leveraging steganography as an obfuscation technique to deliver a wide range of malware such as Agent Tesla, FormBook, Remcos RAT, LokiBot, GuLoader, Snake Keylogger, and XWorm, among others. "The group made extensive use of steganography by sending VBSs, PowerShell code, as well as RTF documents with an embedded exploit, inside ..read more
Visit website
AWS, Google, and Azure CLI Tools Could Leak Credentials in Build Logs
The Hacker News | Cyber Security,Hacking News
by
2d ago
New cybersecurity research has found that command-line interface (CLI) tools from Amazon Web Services (AWS) and Google Cloud can expose sensitive credentials in build logs, posing significant risks to organizations. The vulnerability has been codenamed LeakyCLI by cloud security firm Orca. "Some commands on Azure CLI, AWS CLI, and Google Cloud CLI can expose sensitive information in ..read more
Visit website
Widely-Used PuTTY SSH Client Found Vulnerable to Key Recovery Attack
The Hacker News | Cyber Security,Hacking News
by
2d ago
The maintainers of the PuTTY Secure Shell (SSH) and Telnet client are alerting users of a critical vulnerability impacting versions from 0.68 through 0.80 that could be exploited to achieve full recovery of NIST P-521 (ecdsa-sha2-nistp521) private keys. The flaw has been assigned the CVE identifier CVE-2024-31497, with the discovery credited to researchers Fabian Bäumer and Marcus ..read more
Visit website

Follow The Hacker News | Cyber Security,Hacking News on FeedSpot

Continue with Google
Continue with Apple
OR