menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Hacking News

Hacking News

source image

Securityaffairs

4w

read

263

img
dot

Image Credit: Securityaffairs

Japan ’s FSA warns of unauthorized trades via stolen credentials from fake security firms’ sites

  • Japan's Financial Services Agency (FSA) warns of a sharp increase in unauthorized access and trading on internet trading services.
  • Unauthorized trading through stolen login data from phishing sites that mimic real securities firms is on the rise.
  • The FSA provides data reflecting known cases, revealing millions of yen in unauthorized transactions.
  • To prevent unauthorized trading, users are advised to take precautions such as avoiding suspicious links, enabling security features, and regularly checking account activity.

Read Full Article

like

15 Likes

source image

Securityaffairs

4w

read

102

img
dot

Image Credit: Securityaffairs

Kimsuky APT exploited BlueKeep RDP flaw in attacks against South Korea and Japan

  • Researchers detected Kimsuky APT group exploiting the BlueKeep RDP flaw in attacks against South Korea and Japan.
  • The group gained initial access by exploiting the RDP vulnerability and distributed malware through phishing emails and exploiting the Microsoft Office Equation Editor vulnerability.
  • They installed MySpy malware and RDPWrap to maintain remote access, and deployed keyloggers to record keystrokes.
  • Kimsuky APT has been targeting organizations in multiple countries since September 2023, with a focus on South Korea and Japan.

Read Full Article

like

6 Likes

source image

Securelist

4w

read

431

img
dot

Image Credit: Securelist

Lumma Stealer – Tracking distribution channels

  • Lumma Stealer, introduced in 2022 by the threat actor Lumma, has gained popularity in the cybercriminal underground with prices starting at $250.
  • The threat involves human interaction, such as clicking links or running malicious commands, to execute the malware.
  • Lumma Stealer uses various distribution methods like phishing emails, trojanized applications, and exploit kits for infection.
  • One prominent distribution vector is the fake CAPTCHA scheme that tricks users into executing malicious commands.
  • The fake CAPTCHA pages are promoted on pirated media sites, adult content sites, and fake Telegram channels related to cryptocurrencies.
  • Users are deceived into clicking buttons that execute PowerShell commands, leading to malware downloads and installations.
  • Lumma Stealer employs complex infection techniques like DLL sideloading and injecting payloads into legitimate software to avoid detection.
  • The malware steals sensitive data like cryptocurrency credentials, 2FA data, browser credentials, and financial information.
  • Communication with command and control servers is disguised as legitimate traffic to exfiltrate stolen data.
  • Understanding the infection methods of Lumma Stealer is crucial for developing effective detection and prevention strategies.

Read Full Article

like

25 Likes

source image

Securityaffairs

4w

read

218

img
dot

Image Credit: Securityaffairs

Russia-linked APT29 targets European diplomatic entities with GRAPELOADER malware

  • Russia-linked cyberespionage group APT29, also known as Midnight Blizzard or Cozy Bear, targeted European diplomatic entities with a new malware loader named GRAPELOADER.
  • The phishing campaign used fake wine-tasting invitations sent via domains like bakenhof[.]com and silry[.]com to deliver the malicious file, wine.zip.
  • GRAPELOADER is an initial-stage downloader that ensures persistence by adding a registry entry to run on startup and connects to the command-and-control (C&C) server every 60 seconds.
  • Researchers discovered a new variant of the WINELOADER malware, which shares similarities in code structure and obfuscation techniques with GRAPELOADER.

Read Full Article

like

13 Likes

source image

Hackingblogs

4w

read

115

img
dot

Image Credit: Hackingblogs

Inside the Lexipol Leaks: What Police Don’t Want You to See About Force, Bodycams, and Whistleblowers

  • Recent document leaks have exposed Lexipol's influence on public safety policy.
  • Critics argue that Lexipol's policies promote unethical behavior, such as excessive force and racial profiling.
  • A regulation written by Lexipol was used to justify shutting off a body camera in a 2019 police shooting.
  • The leaks raise concerns about accountability and the influence of private businesses in public law enforcement.

Read Full Article

like

6 Likes

source image

Securelist

4w

read

88

img
dot

Image Credit: Securelist

Phishing attacks leveraging HTML code inside SVG files

  • Phishing attacks are leveraging HTML code inside SVG files to evade security measures.
  • SVG (Scalable Vector Graphics) files are normally used for storing images but can also contain XML markup.
  • Attackers embed scripts with links to phishing pages within SVG image files.
  • There has been a significant increase in SVG phishing campaigns observed in recent months.

Read Full Article

like

5 Likes

source image

Brighter Side of News

4w

read

259

img
dot

Image Credit: Brighter Side of News

Hackers are turning DNA sequencing into a biosecurity nightmare

  • Next-generation DNA sequencing (NGS) has revolutionized genetics, but has also introduced biosecurity risks due to inadequately secured genetic information.
  • A study in IEEE Access by University of Portsmouth researchers reveals vulnerabilities in securing genetic data, exposing it to threats like identity theft and bioweapons development.
  • The rapid growth of sequencing technology has led to valuable medical progress, but the protection of genomic data is a critical concern.
  • Recent cyberattacks on healthcare providers exemplify the risks associated with genetic data breaches, highlighting the potential for identity theft and bioterrorism.
  • Limited awareness of cyber threats in the biotech sector and fragmented research efforts pose significant challenges for securing genetic data.
  • The study identifies weaknesses in the sequencing workflow, emphasizing the need for interdisciplinary collaboration to address security vulnerabilities.
  • Proposed solutions include secure sequencing methods, encrypted storage systems, and global cooperation to safeguard genomic data from exploitation.
  • Urgent interdisciplinary action is required to prevent genetic data misuse for surveillance, discrimination, or bioterrorism, highlighting the importance of coordinated efforts.
  • The integration of artificial intelligence in cyber-biosecurity raises concerns about AI facilitating malicious activities targeting genetic data.
  • Securing genetic information is not only a technical challenge but also an ethical responsibility to protect individual privacy and maintain trust in genetic research.

Read Full Article

like

15 Likes

source image

Kitploit

4w

read

62

img
dot

Image Credit: Kitploit

CentralizedFirewall - Provides A Firewall Manager API Designed To Centralize And Streamline The Management Of Firewall Configurations

  • CentralizedFirewall is a Firewall Manager API aimed at centralizing and streamlining the management of firewall configurations.
  • To set up and run the API project, clone the repository, edit the .env file, start the API with Docker Compose, and verify that the API is running.
  • To connect to the firewall client, install the Firewall Agent, create a new group and API key on the Firewall Manager, and configure the node server's configuration file.
  • Integration with SIEM involves installing the SIEM on the server and configuring it to send logs to the Firewall Manager via a POST request.

Read Full Article

like

3 Likes

source image

Securityaffairs

4w

read

142

img
dot

Image Credit: Securityaffairs

Security Affairs newsletter Round 520 by Pierluigi Paganini – INTERNATIONAL EDITION

  • Attackers exploited SonicWall SMA appliances since January 2025
  • ASUS routers with AiCloud vulnerable to auth bypass exploit
  • U.S. CISA adds Apple products and Microsoft Windows NTLM flaws to its Known Exploited Vulnerabilities catalog
  • Entertainment venue management firm Legends International disclosed a data breach

Read Full Article

like

8 Likes

source image

Medium

4w

read

76

img
dot

Image Credit: Medium

The Critical Role of Information Security Across the Software Development Lifecycle (SDLC)

  • Baking security needs into the early phase of the software development lifecycle ensures it becomes part of the app's foundation.
  • Viewing the design through a security lens helps identify and fix weak spots before coding even begins.
  • Following secure coding practices is essential to prevent breaches caused by sloppy coding.
  • Thorough testing for vulnerabilities before launching the app is crucial to ensure nothing slips through the cracks.

Read Full Article

like

4 Likes

source image

Hackersking

4w

read

115

img
dot

Image Credit: Hackersking

Robots Dot to Dot Nattapong: The Creative Future of EdTech & Robotics

  • Innovative idea 'Robots Dot to Dot Nattapong' merges robotics, artistry, and education to introduce STEM concepts creatively.
  • This approach combines robotic designs and dot-to-dot drawings to facilitate early-age learning of robotics and logic.
  • The method enhances skills like critical thinking, hand-eye coordination, and pattern recognition crucial for coding and engineering.
  • Dot to Dot Nattapong teaches children to envision robots in a mechatronic way, integrating mechanical structure and design.
  • The approach blends art, engineering, coding, and robotics, offering a holistic learning experience for young learners.
  • Educationally, this technique bridges EdTech and STEAM, engaging students through a medium they resonate with.
  • It aids in teaching visual learning, logic in sequence, enticement, STEM subjects, and the amalgamation of technical and creative aspects.
  • The creator behind 'Robots Dot to Dot Nattapong' likely focuses on developing educational content supporting creative learning in robotics.
  • This innovation envisions equal learning opportunities in robotics, potentially evolving into interactive applications and global learning communities.
  • Such creative learning approaches reshape traditional education molds, fostering creativity and technical skills in learners of all ages.

Read Full Article

like

6 Likes

source image

Securityaffairs

4w

read

107

img
dot

Image Credit: Securityaffairs

Attackers exploited SonicWall SMA appliances since January 2025

  • Threat actors have been exploiting a remote code execution flaw in SonicWall SMA appliances since January 2025.
  • The vulnerability, CVE-2021-20035, allows remote authenticated attackers to inject arbitrary commands and potentially execute code.
  • The flaw affects SMA 200, SMA 210, SMA 400, SMA 410, and SMA 500v devices, and the vendor patched it in September 2021.
  • SonicWall SMA 100 series appliances have been targeted in an active campaign to steal VPN credentials using default or weak passwords.

Read Full Article

like

6 Likes

source image

Coinpedia

4w

read

178

img
dot

Image Credit: Coinpedia

FTX’s Bankman-Fried Moved to Low-Security Prison, Home to Infamous Criminals

  • Sam Bankman-Fried, founder of the collapsed cryptocurrency exchange FTX, was transferred to the low-security Federal Correctional Institution Terminal Island.
  • Bankman-Fried made headlines for giving an unauthorized jailhouse interview with media personality Tucker Carlson, sparking public attention.
  • Bankman-Fried was convicted and sentenced to 25 years in prison for his role in the collapse of FTX, one of the largest frauds in cryptocurrency history.
  • There are speculations that Bankman-Fried's recent right-wing messaging could be a strategy to secure a pardon from President Trump.

Read Full Article

like

10 Likes

source image

Kitploit

4w

read

26

img
dot

Image Credit: Kitploit

Maryam - Open-source Intelligence(OSINT) Framework

  • OWASP Maryam is an open-source framework for OSINT and data gathering.
  • It provides a robust environment to harvest data from open sources and search engines quickly.
  • You can install Maryam via pip or from the GitHub repository.
  • The framework supports various modules for searching and gathering data.

Read Full Article

like

1 Like

source image

Hackingblogs

4w

read

15.9k

img
dot

Image Credit: Hackingblogs

Samsung Phones Exposed to Major Security Vulnerabilities!

  • Millions of Samsung phones are saving passwords in plain text in the clipboard, posing a serious security vulnerability.
  • The clipboard in Samsung phones saves all copied content, including passwords, indefinitely and without auto-delete settings.
  • Samsung is aware of the issue but has not yet addressed it.
  • The lack of urgency in resolving the vulnerability exposes users to potential theft or leakage of passwords.

Read Full Article

like

25 Likes

For uninterrupted reading, download the app