TheHackerNews

Category Added in a WPeMatico Campaign

Urgent: Apple Issues Critical Updates for Actively Exploited Zero-Day Flaws

March 7, 2024 Apple has released security updates to address several security flaws, including two vulnerabilities that it said have been actively exploited in the wild. The shortcomings are listed below – CVE-2024-23225 – A memory corruption issue in Kernel that an attacker with arbitrary kernel read and write capability can exploit to bypass kernel memory …

Urgent: Apple Issues Critical Updates for Actively Exploited Zero-Day Flaws Read More »

Hackers Exploit ConnectWise ScreenConnect Flaws to Deploy TODDLERSHARK Malware

March 6, 2024 North Korean threat actors have exploited the recently disclosed security flaws in ConnectWise ScreenConnect to deploy a new malware called TODDLERSHARK. According to a report shared by Kroll with The Hacker News, TODDLERSHARK overlaps with known Kimsuky malware such as BabyShark and ReconShark. “The threat actor gained access to the victim workstation by …

Hackers Exploit ConnectWise ScreenConnect Flaws to Deploy TODDLERSHARK Malware Read More »

Over 225,000 Compromised ChatGPT Credentials Up for Sale on Dark Web Markets

March 6, 2024 More than 225,000 logs containing compromised OpenAI ChatGPT credentials were made available for sale on underground markets between January and October 2023, new findings from Group-IB show. These credentials were found within information stealer logs associated with LummaC2, Raccoon, and RedLine stealer malware. “The number of infected devices decreased slightly in mid- and late …

Over 225,000 Compromised ChatGPT Credentials Up for Sale on Dark Web Markets Read More »

Cybercriminals Using Novel DNS Hijacking Technique for Investment Scams

March 6, 2024 A new DNS threat actor dubbed Savvy Seahorse is leveraging sophisticated techniques to entice targets into fake investment platforms and steal funds. “Savvy Seahorse is a DNS threat actor who convinces victims to create accounts on fake investment platforms, make deposits to a personal account, and then transfers those deposits to a bank in …

Cybercriminals Using Novel DNS Hijacking Technique for Investment Scams Read More »

What is Exposure Management and How Does it Differ from ASM?

March 6, 2024 Startups and scales-ups are often cloud-first organizations and rarely have sprawling legacy on-prem environments. Likewise, knowing the agility and flexibility that cloud environments provide, the mid-market is predominantly running in a hybrid state, partly in the cloud but with some on-prem assets. While there has been a bit of a backswing against …

What is Exposure Management and How Does it Differ from ASM? Read More »

Critical JetBrains TeamCity On-Premises Flaws Could Lead to Server Takeovers

March 6, 2024 A new pair of security vulnerabilities have been disclosed in JetBrains TeamCity On-Premises software that could be exploited by a threat actor to take control of affected systems. The flaws, tracked as CVE-2024-27198 (CVSS score: 9.8) and CVE-2024-27199 (CVSS score: 7.3), have been addressed in version 2023.11.4. They impact all TeamCity On-Premises …

Critical JetBrains TeamCity On-Premises Flaws Could Lead to Server Takeovers Read More »

Warning: Thread Hijacking Attack Targets IT Networks, Stealing NTLM Hashes

March 6, 2024 The threat actor known as TA577 has been observed using ZIP archive attachments in phishing emails with an aim to steal NT LAN Manager (NTLM) hashes. The new attack chain “can be used for sensitive information gathering purposes and to enable follow-on activity,” enterprise security firm Proofpoint said in a Monday report. At least two campaigns …

Warning: Thread Hijacking Attack Targets IT Networks, Stealing NTLM Hashes Read More »

From 500 to 5000 Employees – Securing 3rd Party App-Usage in Mid-Market Companies

March 5, 2024 A company’s lifecycle stage, size, and state have a significant impact on its security needs, policies, and priorities. This is particularly true for modern mid-market companies that are either experiencing or have experienced rapid growth. As requirements and tasks continue to accumulate and malicious actors remain active around the clock, budgets are …

From 500 to 5000 Employees – Securing 3rd Party App-Usage in Mid-Market Companies Read More »

How Cybercriminals are Exploiting India’s UPI for Money Laundering Operations

March 5, 2024 Cybercriminals are using a network of hired money mules in India using an Android-based application to orchestrate a massive money laundering scheme. The malicious application, called XHelper, is a “key tool for onboarding and managing these money mules,” CloudSEK researchers Sparsh Kulshrestha, Abhishek Mathew, and Santripti Bhujel said in a report. Details about the scam  …

How Cybercriminals are Exploiting India’s UPI for Money Laundering Operations Read More »

Over 100 Malicious AI/ML Models Found on Hugging Face Platform

March 5, 2024 As many as 100 malicious artificial intelligence (AI)/machine learning (ML) models have been discovered in the Hugging Face platform. These include instances where loading a pickle file leads to code execution, software supply chain security firm JFrog said. “The model’s payload grants the attacker a shell on the compromised machine, enabling them to gain …

Over 100 Malicious AI/ML Models Found on Hugging Face Platform Read More »

Open Whatsapp chat
Whatsapp Us
Chat with us for faster replies.