PROJET AUTOBLOG


The Hacker News

Site original : The Hacker News

⇐ retour index

New Hacking Campaign by Transparent Tribe Hackers Targeting Indian Officials

mardi 29 mars 2022 à 14:42
A threat actor of likely Pakistani origin has been attributed to yet another campaign designed to backdoor targets of interest with a Windows-based remote access trojan named CrimsonRAT since at least June 2021. "Transparent Tribe has been a highly active APT group in the Indian subcontinent," Cisco Talos researchers said in an analysis shared with The Hacker News. "Their primary targets have

Privid: A Privacy-Preserving Surveillance Video Analytics System

mardi 29 mars 2022 à 13:12
A group of academics has designed a new system known as "Privid" that enables video analytics in a privacy-preserving manner to combat concerns with invasive tracking. "We're at a stage right now where cameras are practically ubiquitous. If there's a camera on every street corner, every place you go, and if someone could actually process all of those videos in aggregate, you can imagine that

Critical Sophos Firewall RCE Vulnerability Under Active Exploitation

mardi 29 mars 2022 à 12:32
Cybersecurity firm Sophos on Monday warned that a recently patched critical security vulnerability in its firewall product is being actively exploited in real-world attacks. The flaw, tracked as CVE-2022-1040, is rated 9.8 out of 10 on the CVSS scoring system and impacts Sophos Firewall versions 18.5 MR3 (18.5.3) and older. It relates to an authentication bypass vulnerability in the User Portal

New Malware Loader 'Verblecon' Infects Hacked PCs with Cryptocurrency Miners

mardi 29 mars 2022 à 12:16
An unidentified threat actor has been observed employing a "complex and powerful" malware loader with the ultimate objective of deploying cryptocurrency miners on compromised systems and potentially facilitating the theft of Discord tokens. "The evidence found on victim networks appears to indicate that the goal of the attacker was to install cryptocurrency mining software on victim machines,"

Experts Detail Virtual Machine Used by Wslink Malware Loader for Obfuscation

mardi 29 mars 2022 à 12:07
Cybersecurity researchers have shed more light on a malicious loader that runs as a server and executes received modules in memory, laying bare the structure of an "advanced multi-layered virtual machine" used by the malware to fly under the radar. Wslink, as the malicious loader is called, was first documented by Slovak cybersecurity company ESET in October 2021, with very few telemetry hits