TheHackerNews

Category Added in a WPeMatico Campaign

Glupteba Botnet Evades Detection with Undocumented UEFI Bootkit

February 14, 2024 The Glupteba botnet has been found to incorporate a previously undocumented Unified Extensible Firmware Interface (UEFI) bootkit feature, adding another layer of sophistication and stealth to the malware. “This bootkit can intervene and control the [operating system] boot process, enabling Glupteba to hide itself and create a stealthy persistence that can be extremely difficult …

Glupteba Botnet Evades Detection with Undocumented UEFI Bootkit Read More »

Ivanti Vulnerability Exploited to Install ‘DSLog’ Backdoor on 670+ IT Infrastructures

February 14, 2024 Threat actors are leveraging a recently disclosed security flaw impacting Ivanti Connect Secure, Policy Secure, and ZTA gateways to deploy a backdoor codenamed DSLog on susceptible devices. That’s according to findings from Orange Cyberdefense, which said it observed the exploitation of CVE-2024-21893 within hours of the public release of the proof-the-concept (PoC) code. Article posted by: …

Ivanti Vulnerability Exploited to Install ‘DSLog’ Backdoor on 670+ IT Infrastructures Read More »

Midnight Blizzard and Cloudflare-Atlassian Cybersecurity Incidents: What to Know

February 14, 2024 The Midnight Blizzard and Cloudflare-Atlassian cybersecurity incidents raised alarms about the vulnerabilities inherent in major SaaS platforms. These incidents illustrate the stakes involved in SaaS breaches — safeguarding the integrity of SaaS apps and their sensitive data is critical but is not easy. Common threat vectors such as sophisticated spear-phishing, misconfigurations and …

Midnight Blizzard and Cloudflare-Atlassian Cybersecurity Incidents: What to Know Read More »

Alert: CISA Warns of Active ‘Roundcube’ Email Attacks – Patch Now

February 14, 2024 The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a medium-severity security flaw impacting Roundcube email software to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The issue, tracked as CVE-2023-43770 (CVSS score: 6.1), relates to a cross-site scripting (XSS) flaw that stems from the handling of Article posted by: …

Alert: CISA Warns of Active ‘Roundcube’ Email Attacks – Patch Now Read More »

4 Ways Hackers use Social Engineering to Bypass MFA

February 13, 2024 When it comes to access security, one recommendation stands out above the rest: multi-factor authentication (MFA). With passwords alone being simple work for hackers, MFA provides an essential layer of protection against breaches. However, it’s important to remember that MFA isn’t foolproof. It can be bypassed, and it often is.  If a …

4 Ways Hackers use Social Engineering to Bypass MFA Read More »

Rhysida Ransomware Cracked, Free Decryption Tool Released

February 13, 2024 Cybersecurity researchers have uncovered an “implementation vulnerability” that has made it possible to reconstruct encryption keys and decrypt data locked by Rhysida ransomware. The findings were published last week by a group of researchers from Kookmin University and the Korea Internet and Security Agency (KISA). “Through a comprehensive analysis of Rhysida Ransomware, …

Rhysida Ransomware Cracked, Free Decryption Tool Released Read More »

CISA and OpenSSF Release Framework for Package Repository Security

February 13, 2024 The U.S. Cybersecurity and Infrastructure Security Agency (CISA) announced that it’s partnering with the Open Source Security Foundation (OpenSSF) Securing Software Repositories Working Group to publish a new framework to secure package repositories. Called the Principles for Package Repository Security, the framework aims to establish a set of foundational rules for package Article posted by: …

CISA and OpenSSF Release Framework for Package Repository Security Read More »

Why Are Compromised Identities the Nightmare to IR Speed and Efficiency?

February 13, 2024 Incident response (IR) is a race against time. You engage your internal or external team because there’s enough evidence that something bad is happening, but you’re still blind to the scope, the impact, and the root cause. The common set of IR tools and practices provides IR teams with the ability to …

Why Are Compromised Identities the Nightmare to IR Speed and Efficiency? Read More »

U.S. Offers $10 Million Bounty for Info Leading to Arrest of Hive Ransomware Leaders

February 13, 2024 The U.S. Department of State has announced monetary rewards of up to $10 million for information about individuals holding key positions within the Hive ransomware operation. It is also giving away an additional $5 million for specifics that could lead to the arrest and/or conviction of any person “conspiring to participate in or attempting …

U.S. Offers $10 Million Bounty for Info Leading to Arrest of Hive Ransomware Leaders Read More »

Microsoft Introduces Linux-Like ‘sudo’ Command to Windows 11

February 13, 2024 Microsoft said it’s introducing Sudo for Windows 11 as part of an early preview version to help users execute commands with administrator privileges. “Sudo for Windows is a new way for users to run elevated commands directly from an unelevated console session,” Microsoft Product Manager Jordi Adoumie said. “It is an ergonomic and …

Microsoft Introduces Linux-Like ‘sudo’ Command to Windows 11 Read More »

Open Whatsapp chat
Whatsapp Us
Chat with us for faster replies.