Cybersecurity

Category Added in a WPeMatico Campaign

Cybersecurity

Washington DC-based group targeted in apparent Pegasus hack

An individual employed by a Washington DC-based organization with international offices was targeted with powerful hacking software made by NSO Group, researchers have claimed, raising new concerns about the proliferation of spyware that can infect Apple devices. The alleged attack was discovered by researchers at the Citizen Lab at the Munk School at the University […]

Cybersecurity

Massive DDoS attack on U.S. financial company thwarted by cyber firm

A cybersecurity company claims it identified and thwarted a massive distributed denial-of-service (DDoS) attack targeting a prominent American financial institution. The researchers at Akamai Technologies did not reveal the company’s name but said it is among their “largest and most influential” customers in the financial sector. DDoS attacks overwhelm websites with a flood of traffic, […]

Cybersecurity

Cybercriminals Using PowerShell to Steal NTLMv2 Hashes from Compromised Windows

Sep 11, 2023THNEndpoint Security / Malware A new cyber attack campaign is leveraging the PowerShell script associated with a legitimate red teaming tool to plunder NTLMv2 hashes from compromised Windows systems primarily located in Australia, Poland, and Belgium. The activity has been codenamed Steal-It by Zscaler ThreatLabz. “In this campaign, the threat actors steal and […]

Cybersecurity

New HijackLoader Modular Malware Loader Making Waves in the Cybercrime World

Sep 11, 2023THNCyber Crime / Malware A new malware loader called HijackLoader is gaining traction among the cybercriminal community to deliver various payloads such as DanaBot, SystemBC, and RedLine Stealer. “Even though HijackLoader does not contain advanced features, it is capable of using a variety of modules for code injection and execution since it uses […]

Cybersecurity

Crypto Phishing Attacks Abuse Google Looker Studio | Cyware Hacker News

Check Point researchers have discovered hackers exploiting Google Looker Studio to create fraudulent cryptocurrency phishing websites. These phishing sites target digital asset holders, leading to compromised accounts and financial losses. Google Looker Studio (previously known as Data Studio, is an online tool for converting data from spreadsheets and various sources into customizable reports.  Scam tactics […]

Cybersecurity

CISA Adds Critical RocketMQ Bug to Must-Patch List

The US government has ordered all federal civilian agencies to patch a critical vulnerability in Apache RocketMQ, which is currently being exploited in the wild. The US Cybersecurity and Infrastructure Security Agency (CISA) added CVE-2023-33246 to its Known Exploited Vulnerabilities Catalog. It means government agencies have until September 27 to apply a vendor patch to affected […]