Warning: Xenomorph Android Banking Trojan is Back and Stronger Than Ever!

The Hacker News Daily Updates
Newsletter
cover

2022 Elastic Global Threat Report

Vol.1 2022

Download Now Sponsored
LATEST NEWS Mar 13, 2023

Warning: AI-generated YouTube Video Tutorials Spreading Infostealer Malware

Threat actors have been increasingly observed using AI-generated YouTube Videos to spread a variety of stealer malware such as Raccoon, RedLine, and Vidar. "The videos lure users by pretending to be tutorials on how to download cracked versions of software such as Photoshop, Premiere Pro, Autodesk 3ds Max, AutoCAD, and other products that are licensed products available only to paid ...

Read More
Twitter Facebook LinkedIn

Researchers Uncover Over a Dozen Security Flaws in Akuvox E11 Smart Intercom

More than a dozen security flaws have been disclosed in E11, a smart intercom product made by Chinese company Akuvox. "The vulnerabilities could allow attackers to execute code remotely in order to activate and control the device's camera and microphone, steal video and images, or gain a network foothold," Claroty security researcher Vera Mens said in a technical write-up. Akuvox E11 ...

Read More
Twitter Facebook LinkedIn

KamiKakaBot Malware Used in Latest Dark Pink APT Attacks on Southeast Asian Targets

The Dark Pink advanced persistent threat (APT) actor has been linked to a fresh set of attacks targeting government and military entities in Southeast Asian countries with a malware called KamiKakaBot. Dark Pink, also called Saaiwc, was extensively profiled by Group-IB earlier this year, describing its use of custom tools such as TelePowerBot and KamiKakaBot to run arbitrary commands ...

Read More
Twitter Facebook LinkedIn

BATLOADER Malware Uses Google Ads to Deliver Vidar Stealer and Ursnif Payloads

The malware downloader known as BATLOADER has been observed abusing Google Ads to deliver secondary payloads like Vidar Stealer and Ursnif. According to cybersecurity company eSentire, the malicious ads are used to spoof a wide range of legitimate apps and services such as Adobe, OpenAPI's ChatGPT, Spotify, Tableau, and Zoom. BATLOADER, as the name suggests, is a loader that's responsible ...

Read More
Twitter Facebook LinkedIn

New Version of Prometei Botnet Infects Over 10,000 Systems Worldwide

An updated version of a botnet malware called Prometei has infected more than 10,000 systems worldwide since November 2022. The infections are both geographically indiscriminate and opportunistic, with a majority of the victims reported in Brazil, Indonesia, and Turkey. Prometei, first observed in 2016, is a modular botnet that features a large repertoire of components and several ...

Read More
Twitter Facebook LinkedIn

China-linked Hackers Targeting Unpatched SonicWall SMA Devices with Malware

A suspecting China-linked hacking campaign has been observed targeting unpatched SonicWall Secure Mobile Access (SMA) 100 appliances to drop malware and establish long-term persistence. "The malware has functionality to steal user credentials, provide shell access, and persist through firmware upgrades," cybersecurity company Mandiant said in a technical report published this week. ...

Read More
Twitter Facebook LinkedIn

International Law Enforcement Takes Down Infamous NetWire Cross-Platform RAT

A coordinated international law enforcement exercise has taken down the online infrastructure associated with a cross-platform remote access trojan (RAT) known as NetWire. Coinciding with the seizure of the sales website www.worldwiredlabs[.]com, a Croatian national who is suspected to be the website's administrator has been arrested. While the suspect's name was not released, ...

Read More
Twitter Facebook LinkedIn

When Partial Protection is Zero Protection: The MFA Blind Spots No One Talks About

Multi-factor Authentication (MFA) has long ago become a standard security practice. With a wide consensus on its ability to fend off more than 99% percent of account takeover attacks, it's no wonder why security architects regard it as a must-have in their environments. However, what seems to be less known are the inherent coverage limitations of traditional MFA solutions. While compatible ...

Read More
Twitter Facebook LinkedIn
cover

2022 Elastic Global Threat Report

Vol.1 2022

Download Now Sponsored

This email was sent to you. You are receiving this newsletter because you opted-in to receive relevant communications from The Hacker News. To manage your email newsletter preferences, please click here.

Contact The Hacker News: info@thehackernews.com
Unsubscribe

The Hacker News | Pearls Omaxe, Netaji Subash Place, Pitampura, Delhi 110034 India

Older messages

Warning: Xenomorph Android Banking Trojan is Back and Stronger Than Ever!

Saturday, March 11, 2023

The Hacker News Daily Updates Newsletter cover 2022 Elastic Global Threat Report Vol.1 2022 Download Now Sponsored LATEST NEWS Mar 11, 2023 New Version of Prometei Botnet Infects Over 10000 Systems

Warning: Xenomorph Android Banking Trojan is Back and Stronger Than Ever!

Friday, March 10, 2023

The Hacker News Daily Updates Newsletter cover Augmenting Your Microsoft EOP and MDO Email Security Infrastructure How can you augment, rather than duplicate, the native security functionality present

New Critical Flaw in FortiOS and FortiProxy Could Give Hackers Remote Access

Thursday, March 9, 2023

The Hacker News Daily Updates Newsletter cover 3 Real-World Challenges Facing Cybersecurity Organizations: How an Exposure Management Platform Can Help Security programs today are reactive when they

Lazarus Group Exploits Zero-Day Vulnerability to Hack South Korean Financial Entity

Wednesday, March 8, 2023

The Hacker News Daily Updates Newsletter cover Solutions Demo: CyberArk Workforce Password Management Attackers used to focus mainly on privileged users' credentials. But now they'll target

Warning! Shein's Android App Caught Transmitting Your Private Data!

Tuesday, March 7, 2023

The Hacker News Daily Updates Newsletter cover The Threat Profiler's Playbook: 6 Steps to Uncovering Ransomware (& Other Nefarious Activity) How much do you understand about the threats you

You Might Also Like

💻 Installing Linux on an Old Laptop Instead of a Raspberry Pi — Flagship Phones Need More Storage

Monday, November 18, 2024

Also: I Built the Perfect Programming Platform In Less Than 10 Minutes, and More! How-To Geek Logo November 18, 2024 Did You Know The Sixth Sense was the highest-grossing horror film of all time in

Daily Coding Problem: Problem #1612 [Hard]

Monday, November 18, 2024

Daily Coding Problem Good morning! Here's your coding interview problem for today. This problem was asked by Etsy. Given a sorted array, convert it into a height-balanced binary search tree.

10,000 ways to fail & The European Search Perspective

Monday, November 18, 2024

Reflecting on over five years of Creativerly, Signal introduces Call Links, the science of mental models, and a lot more in this week's issue of Creativerly. Creativerly 10000 ways to fail &

Charted | Global GHG Emissions, by Sector 🌎

Monday, November 18, 2024

In this graphic, we show greenhouse gas emissions by sector in 2023. View Online | Subscribe | Download Our App Presented by: New 3-Part Series: Bitcoin Demystified >> Learn more about one of the

Spyglass Dispatch: Samsung/Google Smart Glasses • Star Wars Mess • Netflix Knocked Out • Conan's Oscars • MicroStrategy's Comeback • Vision Pro In Focus • Saving 'Inside the NBA' • Apple Television Lives!

Monday, November 18, 2024

Samsung/Google Smart Glasses • Star Wars Mess • Netflix Knocked Out • Conan's Oscars • MicroStrategy's Comeback • Vision Pro In Focus • Saving 'Inside the NBA' • Apple Television Lives!

GCP Newsletter #424

Monday, November 18, 2024

Welcome to issue #425 November 18th, 2024 News Google Kubernetes Engine Official Blog 65000 nodes and counting: Google Kubernetes Engine is ready for trillion-parameter AI models - Google Kubernetes

Design and code beautiful products. Together.

Monday, November 18, 2024

Pablo Ruiz-Múzquiz and the team at ​Penpot​ have recently announced a new plugin feature that allows users to build new tools and functionalities on the platform. ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏

Can Bitcoin Put an End to Forever War?

Monday, November 18, 2024

Top Tech Content sent at Noon! How the world collects web data Read this email in your browser How are you, @newsletterest1? 🪐 What's happening in tech today, November 18, 2024? The HackerNoon

25 tips for programming with AI

Monday, November 18, 2024

Meta Quest dominates Steam VR; Stop squirting hot glue into devices -- ZDNET ZDNET Tech Today - US November 18, 2024 digitalspeed-gettyimages-1322205545 25 AI tips to boost your programming

Ordering, Grouping and Consistency in Messaging systems

Monday, November 18, 2024

We went quite far from our Queue Broker series in recent editions, but today, we're back to it! By powers combined, I joined our Queue Broker implementation to solve the generic idempotency check