Today's Cybersecurity Stories: SpyNote Spyware, CircleCI Breach, Fortinet and Zoho Flaws

The Hacker News Daily Updates
Newsletter
cover

Cybersecurity -- Attack and Defense Strategies - Third Edition ($5.00 Value) FREE for a Limited Time

Cybersecurity -- Attack and Defense Strategies, Third Edition will bring you up to speed with the key aspects of threat assessment and security hygiene, the current threat landscape and its challenges, and how to maintain a strong security posture.

Download Now Sponsored
LATEST NEWS Jan 5, 2023

Blind Eagle Hackers Return with Refined Tools and Sophisticated Infection Chain

A financially motivated threat actor tracked as Blind Eagle has resurfaced with a refined toolset and an elaborate infection chain as part of its attacks targeting organizations in Colombia and Ecuador. Check Point's latest research offers new insights into the Spanish-speaking group's tactics and techniques, including the use of sophisticated tools and government-themed lures to activate ...

Read More
Twitter Facebook LinkedIn

Bluebottle Cybercrime Group Preys on Financial Sector in French-Speaking African Nations

A cybercrime group dubbed Bluebottle has been linked to a set of targeted attacks against the financial sector in Francophone countries located in Africa from at least July 2022 to September 2022. "The group makes extensive use of living-off-the-land, dual use tools, and commodity malware, with no custom malware deployed in this campaign," Symantec, a division of Broadcom Software, said in ...

Read More
Twitter Facebook LinkedIn

Leave manual compliance and risk tasks in 2022. Automate it with Drata.

Automate risk management, evidence collection, and control monitoring. Book a demo here.

Read More
Twitter Facebook LinkedIn

SpyNote Strikes Again: Android Spyware Targeting Financial Institutions

Financial institutions are being targeted by a new version of Android malware called SpyNote at least since October 2022. "The reason behind this increase is that the developer of the spyware, who was previously selling it to other actors, made the source code public," ThreatFabric said in a report shared with The Hacker News. "This has helped other actors [in] developing and distributing ...

Read More
Twitter Facebook LinkedIn

Mitigate the LastPass Attack Surface in Your Environment with this Free Tool

The latest breach announced by LastPass is a major cause for concern to security stakeholders. As often occurs, we are at a security limbo – on the one hand, as LastPass has noted, users who followed LastPass best practices would be exposed to practically zero to extremely low risk. However, to say that password best practices are not followed is a wild understatement. The reality is that ...

Read More
Twitter Facebook LinkedIn

CircleCI Urges Customers to Rotate Secrets Following Security Incident

DevOps platform CircleCI on Wednesday urged its customers to rotate all their secrets following an unspecified security incident. The company said an investigation is currently ongoing, but emphasized that "there are no unauthorized actors active in our systems." Additional details are expected to be shared in the coming days. "Immediately rotate any and all secrets stored in ...

Read More
Twitter Facebook LinkedIn

The Evolving Tactics of Vidar Stealer: From Phishing Emails to Social Media

The notorious information-stealer known as Vidar is continuing to leverage popular social media services such as TikTok, Telegram, Steam, and Mastodon as an intermediate command-and-control (C2) server. "When a user creates an account on an online platform, a unique account page that can be accessed by anyone is generated," AhnLab Security Emergency Response Center (ASEC) disclosed in ...

Read More
Twitter Facebook LinkedIn

Fortinet and Zoho Urge Customers to Patch Enterprise Software Vulnerabilities

Fortinet has warned of a high-severity flaw affecting multiple versions of FortiADC application delivery controller that could lead to the execution of arbitrary code. "An improper neutralization of special elements used in an OS command vulnerability in FortiADC may allow an authenticated attacker with access to the web GUI to execute unauthorized code or commands via specifically crafted ...

Read More
Twitter Facebook LinkedIn
cover

Cybersecurity -- Attack and Defense Strategies - Third Edition ($5.00 Value) FREE for a Limited Time

Cybersecurity -- Attack and Defense Strategies, Third Edition will bring you up to speed with the key aspects of threat assessment and security hygiene, the current threat landscape and its challenges, and how to maintain a strong security posture.

Download Now Sponsored

This email was sent to you. You are receiving this newsletter because you opted-in to receive relevant communications from The Hacker News. To manage your email newsletter preferences, please click here.

Contact The Hacker News: info@thehackernews.com
Unsubscribe

The Hacker News | Pearls Omaxe, Netaji Subash Place, Pitampura, Delhi 110034 India

Older messages

Zero Trust Access for Dummies

Wednesday, January 4, 2023

The Hacker News eBook Update Newsletter Zero Trust Access for Dummies. Never trust. Always verify. Download For Free Throughout this book, you will see special icons that call attention to important

New shc-based Linux Malware Targeting Systems with Cryptocurrency Miner

Wednesday, January 4, 2023

The Hacker News Daily Updates Newsletter cover Protecting the Endpoint to Work from Anywhere As attacks increase, they tend to come through multiple vectors utilizing various techniques, from Trojans

PyTorch Machine Learning Framework Compromised with Malicious Dependency

Tuesday, January 3, 2023

The Hacker News Daily Updates Newsletter cover Protecting the Endpoint to Work from Anywhere As attacks increase, they tend to come through multiple vectors utilizing various techniques, from Trojans

WordPress Security Alert: New Linux Malware Exploiting Over Two Dozen CMS Flaws

Monday, January 2, 2023

The Hacker News Daily Updates Newsletter cover Protecting the Endpoint to Work from Anywhere As attacks increase, they tend to come through multiple vectors utilizing various techniques, from Trojans

Researcher Uncovers Potential Wiretapping Bugs in Google Home Smart Speakers

Saturday, December 31, 2022

The Hacker News Daily Updates Newsletter cover Protecting the Endpoint to Work from Anywhere As attacks increase, they tend to come through multiple vectors utilizing various techniques, from Trojans

You Might Also Like

📞 6 Foldable Phone Misconceptions Busted — What to Know About Family Cell Plans

Tuesday, November 19, 2024

Also: Use These Apps to Improve Spotify, and More! How-To Geek Logo November 19, 2024 Did You Know Despite the widely held misunderstanding that Franklin D. Roosevelt had polio, his health problems and

Debugging TUIs, Dictionary Comprehensions, Puzzles, and More

Tuesday, November 19, 2024

How to Debug Your Textual Application #656 – NOVEMBER 19, 2024 VIEW IN BROWSER The PyCoder's Weekly Logo How to Debug Your Textual Application TUI applications require a full terminal which most

Daily Coding Problem: Problem #1613 [Hard]

Tuesday, November 19, 2024

Daily Coding Problem Good morning! Here's your coding interview problem for today. This problem was asked by VMware. The skyline of a city is composed of several buildings of various widths and

Ranked | U.S. States vs. G7 Countries by GDP per Capita 📊

Tuesday, November 19, 2024

Why compare American states vs G7 economies? Answer: for a granular look at how America has left its peers in the dust. View Online | Subscribe | Download Our App Presented by: OANDA FEATURED STORY US

Spyglass Dispatch: Selling Chrome • Tech Tariffs • Masa Son's Bets • Alexa's Frustrations • Ex-Meta Lobbying • Apple's Missing Battery Pack

Tuesday, November 19, 2024

Selling Chrome • Tech Tariffs • Masa Son's Bets • Alexa's Frustrations • Ex-Meta Lobbying • Apple's Missing Battery Pack The Spyglass Dispatch is a free newsletter sent out daily on

A Go-powered MIDI sequencer

Tuesday, November 19, 2024

Plus a big GoLand release, developing a terminal app with Bubble Tea, and reflecting on the history of Unix. | #​532 — November 19, 2024 Unsub | Web Version Together with Blacksmith Go Weekly Mailpit:

Is AI Progress Slowing? The Scaling Debate OpenAI Doesn’t Want to Have

Tuesday, November 19, 2024

Top Tech Content sent at Noon! How the world collects web data Read this email in your browser How are you, @newsletterest1? 🪐 What's happening in tech today, November 19, 2024? The HackerNoon

Webinar | Data Storytelling: What Organizations Need to Know Going into 2025 📈

Tuesday, November 19, 2024

A free webinar hosted by Visual Capitalist founder Jeff Desjardins. View email in browser In preparation for our new book "The Art of Data" and its speaking tour, we're giving you a sneak

LW 159 - Debunking Misconceptions About GraphQL

Tuesday, November 19, 2024

Debunking Misconceptions About GraphQL ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ Shopify Development news and articles Issue 159 - 11/19/

Dramatic Windows security changes ahead

Tuesday, November 19, 2024

Cheap MacBooks vs. Android laptops; Tech gifts under $25 -- ZDNET ZDNET Tech Today - US November 19, 2024 microsoft sign Microsoft to tighten Windows security dramatically in 2025 Stung by last