Fake ChatGPT Chrome Extension Hijacking Facebook Accounts for Malicious Advertising

The Hacker News Daily Updates
Newsletter
cover

THN Webinar: Inside the High Risk of 3rd-Party SaaS Apps

Don't be a victim of 3rd-Party SaaS App breaches - Learn how to protect your business!

Download Now Sponsored
LATEST NEWS Mar 14, 2023

The Prolificacy of LockBit Ransomware

Today, the LockBit ransomware is the most active and successful cybercrime organization in the world. Attributed to a Russian Threat Actor, LockBit has stepped out from the shadows of the Conti ransomware group, who were disbanded in early 2022. LockBit ransomware was first discovered in September 2019 and was previously known as ABCD ransomware because of the ".abcd virus" extension ...

Read More
Twitter Facebook LinkedIn

Microsoft Warns of Large-Scale Use of Phishing Kits to Send Millions of Emails Daily

An open source adversary-in-the-middle (AiTM) phishing kit has found a number of takers in the cybercrime world for its ability to orchestrate attacks at scale. Microsoft Threat Intelligence is tracking the threat actor behind the development of the kit under its emerging moniker DEV-1101. An AiTM phishing attack typically involves a threat actor attempting to steal and intercept a ...

Read More
Twitter Facebook LinkedIn

Automate compliance and get up to 400 hours of time back

To close and grow major customers, you have to earn trust. But demonstrating security and compliance can be time-consuming and expensive. Unless you use Vanta. See if Vanta is right for your business with a free trial of our SOC 2 compliance framework and Access Reviews ...

Read More
Twitter Facebook LinkedIn

Fortinet FortiOS Flaw Exploited in Targeted Cyberattacks on Government Entities

Government entities and large organizations have been targeted by an unknown threat actor by exploiting a security flaw in Fortinet FortiOS software to result in data loss and OS and file corruption. "The complexity of the exploit suggests an advanced actor and that it is highly targeted at governmental or government-related targets," Fortinet researchers Guillaume Lovet and Alex Kong said in ...

Read More
Twitter Facebook LinkedIn

Large-scale Cyber Attack Hijacks East Asian Websites for Adult Content Redirects

A widespread malicious cyber operation has hijacked thousands of websites aimed at East Asian audiences to redirect visitors to adult-themed content since early September 2022. The ongoing campaign entails injecting malicious JavaScript code to the hacked websites, often connecting to the target web server using legitimate FTP credentials the threat actor previously obtained via an ...

Read More
Twitter Facebook LinkedIn

Fake ChatGPT Chrome Extension Hijacking Facebook Accounts for Malicious Advertising

A fake ChatGPT-branded Chrome browser extension has been found to come with capabilities to hijack Facebook accounts and create rogue admin accounts, highlighting one of the different methods cyber criminals are using to distribute malware. "By hijacking high-profile Facebook business accounts, the threat actor creates an elite army of Facebook bots and a malicious paid media apparatus," ...

Read More
Twitter Facebook LinkedIn

How to Apply NIST Principles to SaaS in 2023

The National Institute of Standards and Technology (NIST) is one of the standard-bearers in global cybersecurity. The U.S.-based institute’s cybersecurity framework helps organizations of all sizes understand, manage, and reduce their cyber-risk levels and better protect their data. Its importance in the fight against cyberattacks can’t be overstated. While NIST hasn’t directly ...

Read More
Twitter Facebook LinkedIn

Warning: AI-generated YouTube Video Tutorials Spreading Infostealer Malware

Threat actors have been increasingly observed using AI-generated YouTube Videos to spread a variety of stealer malware such as Raccoon, RedLine, and Vidar. "The videos lure users by pretending to be tutorials on how to download cracked versions of software such as Photoshop, Premiere Pro, Autodesk 3ds Max, AutoCAD, and other products that are licensed products available only to paid ...

Read More
Twitter Facebook LinkedIn
cover

THN Webinar: Inside the High Risk of 3rd-Party SaaS Apps

Don't be a victim of 3rd-Party SaaS App breaches - Learn how to protect your business!

Download Now Sponsored

This email was sent to you. You are receiving this newsletter because you opted-in to receive relevant communications from The Hacker News. To manage your email newsletter preferences, please click here.

Contact The Hacker News: info@thehackernews.com
Unsubscribe

The Hacker News | Pearls Omaxe, Netaji Subash Place, Pitampura, Delhi 110034 India

Older messages

Warning: Xenomorph Android Banking Trojan is Back and Stronger Than Ever!

Monday, March 13, 2023

The Hacker News Daily Updates Newsletter cover 2022 Elastic Global Threat Report Vol.1 2022 Download Now Sponsored LATEST NEWS Mar 13, 2023 Warning: AI-generated YouTube Video Tutorials Spreading

Warning: Xenomorph Android Banking Trojan is Back and Stronger Than Ever!

Saturday, March 11, 2023

The Hacker News Daily Updates Newsletter cover 2022 Elastic Global Threat Report Vol.1 2022 Download Now Sponsored LATEST NEWS Mar 11, 2023 New Version of Prometei Botnet Infects Over 10000 Systems

Warning: Xenomorph Android Banking Trojan is Back and Stronger Than Ever!

Friday, March 10, 2023

The Hacker News Daily Updates Newsletter cover Augmenting Your Microsoft EOP and MDO Email Security Infrastructure How can you augment, rather than duplicate, the native security functionality present

New Critical Flaw in FortiOS and FortiProxy Could Give Hackers Remote Access

Thursday, March 9, 2023

The Hacker News Daily Updates Newsletter cover 3 Real-World Challenges Facing Cybersecurity Organizations: How an Exposure Management Platform Can Help Security programs today are reactive when they

Lazarus Group Exploits Zero-Day Vulnerability to Hack South Korean Financial Entity

Wednesday, March 8, 2023

The Hacker News Daily Updates Newsletter cover Solutions Demo: CyberArk Workforce Password Management Attackers used to focus mainly on privileged users' credentials. But now they'll target

You Might Also Like

💻 Installing Linux on an Old Laptop Instead of a Raspberry Pi — Flagship Phones Need More Storage

Monday, November 18, 2024

Also: I Built the Perfect Programming Platform In Less Than 10 Minutes, and More! How-To Geek Logo November 18, 2024 Did You Know The Sixth Sense was the highest-grossing horror film of all time in

Daily Coding Problem: Problem #1612 [Hard]

Monday, November 18, 2024

Daily Coding Problem Good morning! Here's your coding interview problem for today. This problem was asked by Etsy. Given a sorted array, convert it into a height-balanced binary search tree.

10,000 ways to fail & The European Search Perspective

Monday, November 18, 2024

Reflecting on over five years of Creativerly, Signal introduces Call Links, the science of mental models, and a lot more in this week's issue of Creativerly. Creativerly 10000 ways to fail &

Charted | Global GHG Emissions, by Sector 🌎

Monday, November 18, 2024

In this graphic, we show greenhouse gas emissions by sector in 2023. View Online | Subscribe | Download Our App Presented by: New 3-Part Series: Bitcoin Demystified >> Learn more about one of the

Spyglass Dispatch: Samsung/Google Smart Glasses • Star Wars Mess • Netflix Knocked Out • Conan's Oscars • MicroStrategy's Comeback • Vision Pro In Focus • Saving 'Inside the NBA' • Apple Television Lives!

Monday, November 18, 2024

Samsung/Google Smart Glasses • Star Wars Mess • Netflix Knocked Out • Conan's Oscars • MicroStrategy's Comeback • Vision Pro In Focus • Saving 'Inside the NBA' • Apple Television Lives!

GCP Newsletter #424

Monday, November 18, 2024

Welcome to issue #425 November 18th, 2024 News Google Kubernetes Engine Official Blog 65000 nodes and counting: Google Kubernetes Engine is ready for trillion-parameter AI models - Google Kubernetes

Design and code beautiful products. Together.

Monday, November 18, 2024

Pablo Ruiz-Múzquiz and the team at ​Penpot​ have recently announced a new plugin feature that allows users to build new tools and functionalities on the platform. ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏

Can Bitcoin Put an End to Forever War?

Monday, November 18, 2024

Top Tech Content sent at Noon! How the world collects web data Read this email in your browser How are you, @newsletterest1? 🪐 What's happening in tech today, November 18, 2024? The HackerNoon

25 tips for programming with AI

Monday, November 18, 2024

Meta Quest dominates Steam VR; Stop squirting hot glue into devices -- ZDNET ZDNET Tech Today - US November 18, 2024 digitalspeed-gettyimages-1322205545 25 AI tips to boost your programming

Ordering, Grouping and Consistency in Messaging systems

Monday, November 18, 2024

We went quite far from our Queue Broker series in recent editions, but today, we're back to it! By powers combined, I joined our Queue Broker implementation to solve the generic idempotency check