TheHackerNews

Category Added in a WPeMatico Campaign

TimbreStealer Malware Spreading via Tax-themed Phishing Scam Targets IT Users

February 29, 2024 Mexican users have been targeted with tax-themed phishing lures at least since November 2023 to distribute a previously undocumented Windows malware called TimbreStealer. Cisco Talos, which discovered the activity, described the authors as skilled and that the “threat actor has previously used similar tactics, techniques and procedures (TTPs) to distribute a banking trojan known Article …

TimbreStealer Malware Spreading via Tax-themed Phishing Scam Targets IT Users Read More »

Superusers Need Super Protection: How to Bridge Privileged Access Management and Identity Management

February 29, 2024 Traditional perimeter-based security has become costly and ineffective. As a result, communications security between people, systems, and networks is more important than blocking access with firewalls. On top of that, most cybersecurity risks are caused by just a few superusers – typically one out of 200 users. There’s a company aiming to fix the …

Superusers Need Super Protection: How to Bridge Privileged Access Management and Identity Management Read More »

From Alert to Action: How to Speed Up Your SOC Investigations

February 28, 2024 Processing alerts quickly and efficiently is the cornerstone of a Security Operations Center (SOC) professional’s role. Threat intelligence platforms can significantly enhance their ability to do so. Let’s find out what these platforms are and how they can empower analysts. The Challenge: Alert Overload The modern SOC faces a relentless barrage of …

From Alert to Action: How to Speed Up Your SOC Investigations Read More »

Open-Source Xeno RAT Trojan Emerges as a Potent Threat on GitHub

February 28, 2024 An “intricately designed” remote access trojan (RAT) called Xeno RAT has been made available on GitHub, making it available to other actors at no extra cost. Written in C# and compatible with Windows 10 and Windows 11 operating systems, the open-source RAT comes with a “comprehensive set of features for remote system management,” according …

Open-Source Xeno RAT Trojan Emerges as a Potent Threat on GitHub Read More »

WordPress LiteSpeed Plugin Vulnerability Puts 5 Million Sites at Risk

February 28, 2024 A security vulnerability has been disclosed in the LiteSpeed Cache plugin for WordPress that could enable unauthenticated users to escalate their privileges. Tracked as CVE-2023-40000, the vulnerability was addressed in October 2023 in version 5.7.0.1. “This plugin suffers from unauthenticated site-wide stored [cross-site scripting] vulnerability and could allow any unauthenticated user Article posted …

WordPress LiteSpeed Plugin Vulnerability Puts 5 Million Sites at Risk Read More »

Five Eyes Agencies Expose APT29’s Evolving Cloud Attack Tactics

February 28, 2024 Cybersecurity and intelligence agencies from the Five Eyes nations have released a joint advisory detailing the evolving tactics of the Russian state-sponsored threat actor known as APT29. The hacking outfit, also known as BlueBravo, Cloaked Ursa, Cozy Bear, Midnight Blizzard (formerly Nobelium), and The Dukes, is assessed to be affiliated with the Foreign …

Five Eyes Agencies Expose APT29’s Evolving Cloud Attack Tactics Read More »

WordPress Plugin Alert – Critical SQLi Vulnerability Threatens 200K+ Websites

February 28, 2024 A critical security flaw has been disclosed in a popular WordPress plugin called Ultimate Member that has more than 200,000 active installations. The vulnerability, tracked as CVE-2024-1071, carries a CVSS score of 9.8 out of a maximum of 10. Security researcher Christiaan Swiers has been credited with discovering and reporting the flaw. In an …

WordPress Plugin Alert – Critical SQLi Vulnerability Threatens 200K+ Websites Read More »

New Hugging Face Vulnerability Exposes AI Models to Supply Chain Attacks

February 28, 2024 Cybersecurity researchers have found that it’s possible to compromise the Hugging Face Safetensors conversion service to ultimately hijack the models submitted by users and result in supply chain attacks. “It’s possible to send malicious pull requests with attacker-controlled data from the Hugging Face service to any repository on the platform, as well …

New Hugging Face Vulnerability Exposes AI Models to Supply Chain Attacks Read More »

New IDAT Loader Attacks Using Steganography to Deploy Remcos RAT

February 27, 2024 Ukrainian entities based in Finland have been targeted as part of a malicious campaign distributing a commercial remote access trojan known as Remcos RAT using a malware loader called IDAT Loader. The attack has been attributed to a threat actor tracked by the Computer Emergency Response Team of Ukraine (CERT-UA) under the …

New IDAT Loader Attacks Using Steganography to Deploy Remcos RAT Read More »

Three Tips to Protect Your Secrets from AI Accidents

February 27, 2024 Last year, the Open Worldwide Application Security Project (OWASP) published multiple versions of the “OWASP Top 10 For Large Language Models,” reaching a 1.0 document in August and a 1.1 document in October. These documents not only demonstrate the rapidly evolving nature of Large Language Models, but the evolving ways in which …

Three Tips to Protect Your Secrets from AI Accidents Read More »

Open Whatsapp chat
Whatsapp Us
Chat with us for faster replies.