Google Identifies 34 Cracked Versions of Popular Cobalt Strike Hacking Toolkit in the Wild

The Hacker News Daily Updates
Newsletter
cover

2022 First Half Threat Report

A Semiannual Report by FortiGuard Labs

Download Now Sponsored
LATEST NEWS Nov 21, 2022

Notorious Emotet Malware Returns With High-Volume Malspam Campaign

The notorious Emotet malware has returned with renewed vigor as part of a high-volume malspam campaign designed to drop payloads like IcedID and Bumblebee. "Hundreds of thousands of emails per day" have been sent since early November 2022, enterprise security company Proofpoint said last week, ...

Read More
Twitter Facebook LinkedIn

Been Doing It The Same Way For Years? Think Again.

As IT professionals, we all reach a certain point in our IT career where we realize that some of our everyday tasks are done the same way year after year without anyone questioning why it's done that way. Despite the constant change and improvement in technology, some things just get done the same ...

Read More
Twitter Facebook LinkedIn

Top 10 Vulnerability Management Tools for 2022

A complete round-up of the top 10 vulnerability management tools for 2022, including key features, pros, cons, and prices (where available) >>

Read More
Twitter Facebook LinkedIn

Google Wins Lawsuit Against Russians Linked to Blockchain-based Glupteba Botnet

Google has won a lawsuit filed against two Russian nationals in connection with the operation of a botnet called Glupteba, the company said last week. The U.S. District Court for the Southern District of New York imposed monetary sanctions against the defendants and their U.S.-based legal counsel. ...

Read More
Twitter Facebook LinkedIn

Google Identifies 34 Cracked Versions of Popular Cobalt Strike Hacking Toolkit in the Wild

Google Cloud last week disclosed that it identified 34 different hacked release versions of the Cobalt Strike tool in the wild, the earliest of which shipped in November 2012. The versions, spanning 1.44 to 4.7, add up to a total of 275 unique JAR files, according to findings from the Google Cloud ...

Read More
Twitter Facebook LinkedIn

Indian Government Publishes Draft of Digital Personal Data Protection Bill 2022

The Indian government on Friday released a draft version of the much-awaited data protection regulation, making it the fourth such effort since it was first proposed in July 2018. The Digital Personal Data Protection Bill, 2022, as it's called, aims to secure personal data, while also seeking ...

Read More
Twitter Facebook LinkedIn

Microsoft Warns of Hackers Using Google Ads to Distribute Royal Ransomware

A developing threat activity cluster has been found using Google Ads in one of its campaigns to distribute various post-compromise payloads, including the recently discovered Royal ransomware. Microsoft, which spotted the updated malware delivery method in late October 2022, is tracking the group ...

Read More
Twitter Facebook LinkedIn

Chinese 'Mustang Panda' Hackers Actively Targeting Governments Worldwide

A notorious advanced persistent threat actor known as Mustang Panda has been linked to a spate of spear-phishing attacks targeting government, education, and research sectors across the world. The primary targets of the intrusions from May to October 2022 included counties in the Asia Pacific ...

Read More
Twitter Facebook LinkedIn
cover

How to Use a Hacker's Toolkit Against Them

How can you stay one step ahead of hackers targeting your employees to keep your organization safe?

Download Now Sponsored

This email was sent to you. You are receiving this newsletter because you opted-in to receive relevant communications from The Hacker News. To manage your email newsletter preferences, please click here.

Contact The Hacker News: info@thehackernews.com
Unsubscribe

The Hacker News | Pearls Omaxe, Netaji Subash Place, Pitampura, Delhi 110034 India

Key phrases

Older messages

Atlassian Releases Patches for Critical Flaws Affecting Crowd and Bitbucket Products

Saturday, November 19, 2022

The Hacker News Daily Updates Newsletter cover The Myths of Training Cybersecurity Professionals Training myths can reduce preparedness Download Now Sponsored LATEST NEWS Nov 19, 2022 Indian Government

Hive Ransomware Attackers Extorted $100 Million from Over 1,300 Companies Worldwide

Friday, November 18, 2022

The Hacker News Daily Updates Newsletter cover The Human Hacking Report Phishing is a human problem across all digital channels Download Now Sponsored LATEST NEWS Nov 18, 2022 Meta Reportedly Fires

FBI-Wanted Leader of the Notorious Zeus Botnet Gang Arrested in Geneva

Thursday, November 17, 2022

The Hacker News Daily Updates Newsletter cover Data Skills to Future-Proof Your Organization Webinar Download Now Sponsored LATEST NEWS Nov 17, 2022 Chinese Hackers Using 42000 Imposter Domains in

7 Passwordless Approaches for B2C

Wednesday, November 16, 2022

The Hacker News eBook Update Newsletter 7 Passwordless Approaches for B2C Download For Free Passwords are problematic. They are hard to remember, and they don't work well. Passwords can be guessed

Google to Roll Out Privacy Sandbox Beta on Android 13 by Early 2023

Wednesday, November 16, 2022

The Hacker News Daily Updates Newsletter cover State of Bot Attacks: What to Expect in 2023 | Available On-Demand | Download Now Sponsored LATEST NEWS Nov 16, 2022 Researchers Discover Hundreds of

You're invited to our next event about developer tools!

Sunday, November 27, 2022

In case you've missed it Only 2 days left to join our TED-like online event! We meet once a month to learn new stuff from world-class developers. In this event we'll focus on developer tools!

Palette/Ultralight running shoes/Futurepedia

Sunday, November 27, 2022

Recomendo Recomendo November 27 · Issue #334 · View online A weekly newsletter that gives you 6 brief personal recommendations of cool stuff. For a searchable archive of past issues check out https://

Kotlin Weekly #330

Sunday, November 27, 2022

ISSUE #330 27th of November 2022 Announcements We Are Looking For EAP Champions! The Kotlin Team is looking for Kotlin Early Access Preview (EAP) champions. If you are interested make sure that you

Tesla.com/.gitignore — Show HN: Using stylometry to find HN users with alternate accounts — and The Need to Read

Saturday, November 26, 2022

Issue #963 — Top 20 stories of November 27, 2022 Issue #963 — November 27, 2022 You receive this email because you are subscribed to Hacker News Digest. You can open it in the browser if you prefer. 1

⚡️30% OFF – only three days left⚡️

Saturday, November 26, 2022

Don't miss out! ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌

Digest #79: Run GitHub Actions Locally 🚀

Saturday, November 26, 2022

Digest #79: Run GitHub Actions Locally 🚀 #79: Run GitHub Actions Locally This week's newsletter highlights why containers are just chrooted processes, how to migrate from Postgres to DynamoDB,

Daily Coding Problem: Problem #947 [Hard]

Saturday, November 26, 2022

Daily Coding Problem Good morning! Here's your coding interview problem for today. This problem was asked by Oracle. We say a number is sparse if there are no adjacent ones in its binary

12 AirPods Features You Should be Using

Saturday, November 26, 2022

Did You Know?: Most cranberries are harvested by flooding their fields (they float thanks to little air pockets in the berries) and tend to be frozen or processed quickly once harvested. Those that are

Infographic | Every Song With Over 1 Billion Spotify Streams 🎧

Saturday, November 26, 2022

Spotify's 'Billions Club' playlist tracks every song with over 1 billion streams. We took the data and broke it down by decade and artist. View Online | Subscribe Presented by: Our latest

U.S. Bans Chinese Telecom Equipment and Surveillance Cameras Over National Security Risk

Saturday, November 26, 2022

The Hacker News Daily Updates Newsletter cover A Must-Have Checklist for Workplace Security and Protection What do a bustling workplace, happy employees, and secure equipment and data all have in