Category: TheHackerNews

Cryptocurrency Mining and Proxyjacking
03
Oct
2024

New Perfctl Malware Targets Linux Servers for Cryptocurrency Mining and Proxyjacking

Oct 03, 2024Ravie LakshmananLinux / Malware Linux servers are the target of an ongoing campaign that delivers a stealthy malware…

Stealthy Cyber Attacks
03
Oct
2024

North Korean Hackers Using New VeilShell Backdoor in Stealthy Cyber Attacks

Oct 03, 2024Ravie LakshmananCyber Espionage / Threat Intelligence Threat actors with ties to North Korea have been observed delivering a…

Phishing and Romance Fraud
03
Oct
2024

INTERPOL Arrests 8 in Major Phishing and Romance Fraud Crackdown in West Africa

Oct 03, 2024Ravie LakshmananCybercrime / Financial Fraud INTERPOL has announced the arrest of eight individuals in Côte d’Ivoire and Nigeria…

LockBit Ransomware and Evil Corp
03
Oct
2024

LockBit Ransomware and Evil Corp Leaders Arrested and Sanctioned in Joint Global Effort

Oct 03, 2024Ravie LakshmananCybercrime / Ransomware A new wave of international law enforcement actions has led to four arrests and…

Ivanti Endpoint Manager
03
Oct
2024

Ivanti Endpoint Manager Flaw Actively Targeted, CISA Warns Agencies to Patch

Oct 03, 2024Ravie LakshmananVulnerability / Endpoint Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a security…

Fake Trading Apps
02
Oct
2024

Fake Trading Apps Target Victims Globally via Apple App Store and Google Play

A large-scale fraud campaign leveraged fake trading apps published on the Apple App Store and Google Play Store, as well…

Fake Trading Apps
02
Oct
2024

Fake Trading Apps Target Victims Globally via Apple App Store and Google Play

A large-scale fraud campaign leveraged fake trading apps published on the Apple App Store and Google Play Store, as well…

Data Exfiltration
02
Oct
2024

China-Linked CeranaKeeper Targeting Southeast Asia with Data Exfiltration

Oct 02, 2024Ravie LakshmananCyber Espionage / Cloud Security A previously undocumented threat actor called CeranaKeeper has been linked to a…

Fake Job Applications
02
Oct
2024

Fake Job Applications Deliver Dangerous More_eggs Malware to HR Professionals

Oct 02, 2024Ravie LakshmananCybercrime / Threat Intelligence A spear-phishing email campaign has been observed targeting recruiters with a JavaScript backdoor…

DrayTek Routers
02
Oct
2024

Over 700,000 DrayTek Routers Exposed to Hacking via 14 New Vulnerabilities

Oct 02, 2024Ravie LakshmananVulnerability / Network Security A little over a dozen new security vulnerabilities have been discovered in residential…

Adobe Commerce and Magento Stores
02
Oct
2024

Adobe Commerce and Magento Stores Under Attack from CosmicSting Exploit

Oct 02, 2024Ravie LakshmananVulnerability / Data Breach Cybersecurity researchers have disclosed that 5% of all Adobe Commerce and Magento stores…

Dynamic Malware Analysis
02
Oct
2024

5 Must-Have Tools for Effective Dynamic Malware Analysis

Dynamic malware analysis is a key part of any threat investigation. It involves executing a sample of a malicious program…