Ukraine Hit with New Golang-based 'SwiftSlicer' Wiper Malware in Latest Cyber Attack

The Hacker News Daily Updates
Newsletter
cover

Building trust with persistent third-party risk management

Strong third-party relationships are more important than ever to businesses today. As the recent pandemic has clearly demonstrated, any disruptions to strategic partnerships--such as supply chain networks and manufacturers--can have a huge impact on a brand’s reputation and financial well-being. That’s why robust third-party risk management (TPRM) should play a key role in any company’s overall risk management strategy.

Download Now Sponsored
LATEST NEWS Jan 28, 2023

Microsoft Urges Customers to Secure On-Premises Exchange Servers

Microsoft is urging customers to keep their Exchange servers updated as well as take steps to bolster the environment, such as enabling Windows Extended Protection and configuring certificate-based signing of PowerShell serialization payloads. "Attackers looking to exploit unpatched Exchange servers are not going to go away," the tech giant's Exchange Team said in a post. "There are too ...

Read More
Twitter Facebook LinkedIn

Eliminating SaaS Shadow IT is Now Available via a Self-Service Product, Free of Charge

The use of software as a service (SaaS) is experiencing rapid growth and shows no signs of slowing down. Its decentralized and easy-to-use nature is beneficial for increasing employee productivity, but it also poses many security and IT challenges. Keeping track of all the SaaS applications that have been granted access to an organization's data is a difficult task. Understanding the risks ...

Read More
Twitter Facebook LinkedIn

ISC Releases Security Patches for New BIND DNS Software Vulnerabilities

The Internet Systems Consortium (ISC) has released patches to address multiple security vulnerabilities in the Berkeley Internet Name Domain (BIND) 9 Domain Name System (DNS) software suite that could lead to a denial-of-service (DoS) condition. "A remote attacker could exploit these vulnerabilities to potentially cause denial-of-service conditions and system failures," the U.S. ...

Read More
Twitter Facebook LinkedIn

Ukraine Hit with New Golang-based 'SwiftSlicer' Wiper Malware in Latest Cyber Attack

Ukraine has come under a fresh cyber onslaught from Russia that involved the deployment of a previously undocumented Golang-based data wiper dubbed SwiftSlicer. ESET attributed the attack to Sandworm, a nation-state group linked to Military Unit 74455 of the Main Intelligence Directorate of the General Staff of the Armed Forces of the Russian Federation (GRU). "Once executed it deletes ...

Read More
Twitter Facebook LinkedIn

Experts Uncover the Identity of Mastermind Behind Golden Chickens Malware Service

Cybersecurity researchers have discovered the real-world identity of the threat actor behind Golden Chickens malware-as-a-service, who goes by the online persona "badbullzvenom." eSentire's Threat Response Unit (TRU), in an exhaustive report published following a 16-month-long investigation, said it "found multiple mentions of the badbullzvenom account being shared between two people." ...

Read More
Twitter Facebook LinkedIn

Researchers Discover New PlugX Malware Variant Spreading via Removable USB Devices

Cybersecurity researchers have uncovered a PlugX sample that employs sneaky methods to infect attached removable USB media devices in order to propagate the malware to additional systems. "This PlugX variant is wormable and infects USB devices in such a way that it conceals itself from the Windows operating file system," Palo Alto Networks Unit 42 researchers Mike Harbison and Jen ...

Read More
Twitter Facebook LinkedIn

3 Lifehacks While Analyzing Orcus RAT in a Malware Sandbox

Orcus is a Remote Access Trojan with some distinctive characteristics. The RAT allows attackers to create plugins and offers a robust core feature set that makes it quite a dangerous malicious program in its class. RAT is quite a stable type that always makes it to the top. ANY.RUN’s top malware types in 2022 That's why you'll definitely come across this type in your practice, and the ...

Read More
Twitter Facebook LinkedIn

British Cyber Agency Warns of Russian and Iranian Hackers Targeting Key Industries

The U.K. National Cyber Security Centre (NCSC) on Thursday warned of spear-phishing attacks mounted by Russian and Iranian state-sponsored actors for information-gathering operations. "The attacks are not aimed at the general public but targets in specified sectors, including academia, defense, government organizations, NGOs, think tanks, as well as politicians, journalists and activists," ...

Read More
Twitter Facebook LinkedIn
cover

5 Governance Cyber Risks to Eliminate in 2023

Do you have a plan in place to respond to cybersecurity threats?

Download Now Sponsored

This email was sent to you. You are receiving this newsletter because you opted-in to receive relevant communications from The Hacker News. To manage your email newsletter preferences, please click here.

Contact The Hacker News: info@thehackernews.com
Unsubscribe

The Hacker News | Pearls Omaxe, Netaji Subash Place, Pitampura, Delhi 110034 India

Older messages

Victory against cybercrime: Hive Ransomware Infrastructure Seized

Friday, January 27, 2023

The Hacker News Daily Updates Newsletter cover The 3 Approaches to Breach & Attack Simulation Technologies Demand for the latest and most comprehensive testing solutions continues to grow to

U.S. Federal Agencies Fall Victim to Cyber Attack Utilizing Legitimate RMM Software

Thursday, January 26, 2023

The Hacker News Daily Updates Newsletter cover Windows 11 For Dummies ($15.00 Value) FREE for a Limited Time Need Windows help? Find the latest tips and tricks in this perennial favorite on Windows

Industrial Cybersecurity Pulse Protecting Critical Infrastructure eBook

Wednesday, January 25, 2023

The Hacker News eBook Update Newsletter Industrial Cybersecurity Pulse Protecting Critical Infrastructure eBook Download For Free Featured articles in this eBook include stories on how a desert water

Chinese Hackers Utilize Golang Malware in DragonSpark Attacks to Evade Detection

Wednesday, January 25, 2023

The Hacker News Daily Updates Newsletter cover Security Basics Quick Reference Guide Businesses worldwide are at risk for security breaches. Download Now Sponsored LATEST NEWS Jan 25, 2023 North Korean

Apple Issues Updates for Older Devices to Fix Actively Exploited Vulnerability

Tuesday, January 24, 2023

The Hacker News Daily Updates Newsletter cover Cybercrime Survival Guide Arm yourself with knowledge! Download Now Sponsored LATEST NEWS Jan 24, 2023 FBI Says North Korean Hackers Behind $100 Million

You Might Also Like

Is AI Progress Slowing? The Scaling Debate OpenAI Doesn’t Want to Have

Tuesday, November 19, 2024

Top Tech Content sent at Noon! How the world collects web data Read this email in your browser How are you, @newsletterest1? 🪐 What's happening in tech today, November 19, 2024? The HackerNoon

Webinar | Data Storytelling: What Organizations Need to Know Going into 2025 📈

Tuesday, November 19, 2024

A free webinar hosted by Visual Capitalist founder Jeff Desjardins. View email in browser In preparation for our new book "The Art of Data" and its speaking tour, we're giving you a sneak

LW 159 - Debunking Misconceptions About GraphQL

Tuesday, November 19, 2024

Debunking Misconceptions About GraphQL ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ Shopify Development news and articles Issue 159 - 11/19/

Dramatic Windows security changes ahead

Tuesday, November 19, 2024

Cheap MacBooks vs. Android laptops; Tech gifts under $25 -- ZDNET ZDNET Tech Today - US November 19, 2024 microsoft sign Microsoft to tighten Windows security dramatically in 2025 Stung by last

⚙️ Interview: MSFT VP talks AI agents

Tuesday, November 19, 2024

Plus: Elon Musk sues to block CA law ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌ ‌

Post from Syncfusion Blogs on 11/19/2024

Tuesday, November 19, 2024

New blogs from Syncfusion Syncfusion Visual Studio Extensions Are Now Compatible With .NET 9.0 By Kesavaraman Venkadesan This blog explains the support for .NET 9.0 in Syncfusion Visual Studio

New 'Helldown' Ransomware Variant Expands Attacks to VMware and Linux Systems

Tuesday, November 19, 2024

THN Daily Updates Newsletter cover Practical Cyber Intelligence ($79.00 Value) FREE for a Limited Time Overview of the latest techniques and practices used in digital forensics and how to apply them to

This Classy New SmartWatch Has iPhone Connective Features

Tuesday, November 19, 2024

Introducing ScanWatch Nova Brilliant Edition: Watchmaking excellence coupled with powerful health scans and phenomenal battery life. Effortlessly tracking your every move, ScanWatch Nova Brilliant

Edge 449: Getting Into Adversarial Distillation

Tuesday, November 19, 2024

A way to distill models using inspiration from GANs. ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏

Power BI Weekly #285 - 19th November 2024

Tuesday, November 19, 2024

Power BI Weekly Newsletter Issue #285 powered by endjin Welcome to the 285th edition of Power BI Weekly! Quite a short one this week. A couple of people have written about the new Path Layer feature