Category: Uncategorized
-
Astaroth Banking Malware Resurfaces in Brazil via Spear-Phishing Attack [email protected] (The Hacker News)
A new spear-phishing campaign targeting Brazil has been found delivering a banking malware called Astaroth (aka Guildma) by making use of obfuscated JavaScript to slip past security guardrails. “The spear-phishing campaign’s impact has targeted various industries, with manufacturing companies, retail firms, and government agencies being the most affected,” Trend Micro said in a new analysis.…
-
GitHub Patches Critical Flaw in Enterprise Server Allowing Unauthorized Instance Access [email protected] (The Hacker News)
GitHub has released security updates for Enterprise Server (GHES) to address multiple issues, including a critical bug that could allow unauthorized access to an instance. The vulnerability, tracked as CVE-2024-9487, carries a CVS score of 9.5 out of a maximum of 10.0 “An attacker could bypass SAML single sign-on (SSO) authentication with the optional encrypted…
-
CISA Warns of Active Exploitation in SolarWinds Help Desk Software Vulnerability [email protected] (The Hacker News)
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a critical security flaw impacting SolarWinds Web Help Desk (WHD) software to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. Tracked as CVE-2024-28987 (CVSS score: 9.1), the vulnerability relates to a case of hard-coded credentials that could be abused to gainRead…
-
How to define cyber-risk appetite as a security leader
Post ContentRead More
-
FIDO unveils new specifications to transfer passkeys
Post ContentRead More
-
TrickMo Banking Trojan Can Now Capture Android PINs and Unlock Patterns [email protected] (The Hacker News)
New variants of an Android banking trojan called TrickMo have been found to harbor previously undocumented features to steal a device’s unlock pattern or PIN. “This new addition enables the threat actor to operate on the device even while it is locked,” Zimperium security researcher Aazim Yaswant said in an analysis published last week. First…
-
New Malware Campaign Uses PureCrypter Loader to Deliver DarkVision RAT [email protected] (The Hacker News)
Cybersecurity researchers have disclosed a new malware campaign that leverages a malware loader named PureCrypter to deliver a commodity remote access trojan (RAT) called DarkVision RAT. The activity, observed by Zscaler ThreatLabz in July 2024, involves a multi-stage process to deliver the RAT payload. “DarkVision RAT communicates with its command-and-control (C2) server using a custom…
-
New Linux Variant of FASTCash Malware Targets Payment Switches in ATM Heists [email protected] (The Hacker News)
North Korean threat actors have been observed using a Linux variant of a known malware family called FASTCash to steal funds as part of a financially-motivated campaign. The malware is “installed on payment switches within compromised networks that handle card transactions for the means of facilitating the unauthorized withdrawal of cash from ATMs,” a security…
-
The Rise of Zero-Day Vulnerabilities: Why Traditional Security Solutions Fall Short [email protected] (The Hacker News)
In recent years, the number and sophistication of zero-day vulnerabilities have surged, posing a critical threat to organizations of all sizes. A zero-day vulnerability is a security flaw in software that is unknown to the vendor and remains unpatched at the time of discovery. Attackers exploit these flaws before any defensive measures can be implemented,…
-
China Accuses U.S. of Fabricating Volt Typhoon to Hide Its Own Hacking Campaigns [email protected] (The Hacker News)
China’s National Computer Virus Emergency Response Center (CVERC) has doubled down on claims that the threat actor known as the Volt Typhoon is a fabrication of the U.S. and its allies. The agency, in collaboration with the National Engineering Laboratory for Computer Virus Prevention Technology, went on to accuse the U.S. federal government, intelligence agencies,…