Attention Samsung Users! Google Uncovers 18 Alarming Security Flaws in Exynos Chips

The Hacker News Daily Updates
Newsletter
cover

THN Webinar: Master the Six Phases of Incident Response

React fast, respond smart: Master the six phases of Incident Response with Cynet's IR Leader!

Download Now Sponsored
LATEST NEWS Mar 17, 2023

A New Security Category Addresses Web-borne Threats

In the modern corporate IT environment, which relies on cloud connectivity, global connections and large volumes of data, the browser is now the most important work interface. The browser connects employees to managed resources, devices to the web, and the on-prem environment to the cloud one. Yet, and probably unsurprisingly, this browser prominence has significantly increased the number ...

Read More
Twitter Facebook LinkedIn

Lookalike Telegram and WhatsApp Websites Distributing Cryptocurrency Stealing Malware

Copycat websites for instant messaging apps like Telegram and WhatApp are being used to distribute trojanized versions and infect Android and Windows users with cryptocurrency clipper malware. "All of them are after victims' cryptocurrency funds, with several targeting cryptocurrency wallets," ESET researchers Lukáš Štefanko and Peter Strýček said in a new analysis. While the first instance ...

Read More
Twitter Facebook LinkedIn

Winter Vivern APT Group Targeting Indian, Lithuanian, Slovakian, and Vatican Officials

The advanced persistent threat known as Winter Vivern has been linked to campaigns targeting government officials in India, Lithuania, Slovakia, and the Vatican since 2021. The activity targeted Polish government agencies, the Ukraine Ministry of Foreign Affairs, the Italy Ministry of Foreign Affairs, and individuals within the Indian government, SentinelOne said in a report shared with ...

Read More
Twitter Facebook LinkedIn

Google Uncovers 18 Severe Security Vulnerabilities in Samsung Exynos Chips

Google is calling attention to a set of severe security flaws in Samsung's Exynos chips, some of which could be exploited remotely to completely compromise a phone without requiring any user interaction. The 18 zero-day vulnerabilities affect a wide range of Android smartphones from Samsung, Vivo, Google, wearables using the Exynos W920 chipset, and vehicles equipped with the Exynos Auto ...

Read More
Twitter Facebook LinkedIn

Chinese and Russian Hackers Using SILKLOADER Malware to Evade Detection

Threat activity clusters affiliated with the Chinese and Russian cybercriminal ecosystems have been observed using a new piece of malware that's designed to load Cobalt Strike onto infected machines. Dubbed SILKLOADER by Finnish cybersecurity company WithSecure, the malware leverages DLL side-loading techniques to deliver commercial adversary simulation software. The development comes ...

Read More
Twitter Facebook LinkedIn

Cryptojacking Group TeamTNT Suspected of Using Decoy Miner to Conceal Data Exfiltration

The cryptojacking group known as TeamTNT is suspected to be behind a previously undiscovered strain of malware used to mine Monero cryptocurrency on compromised systems. That's according to Cado Security, which found the sample after Sysdig detailed a sophisticated attack known as SCARLETEEL aimed at containerized environments to ultimately steal proprietary data and software. Specifically, ...

Read More
Twitter Facebook LinkedIn

Authorities Shut Down ChipMixer Platform Tied to Crypto Laundering Scheme

A coalition of law enforcement agencies across Europe and the U.S. announced the takedown of ChipMixer, an unlicensed cryptocurrency mixer that began its operations in August 2017. "The ChipMixer software blocked the blockchain trail of the funds, making it attractive for cybercriminals looking to launder illegal proceeds from criminal activities such as drug trafficking, weapons ...

Read More
Twitter Facebook LinkedIn

What's Wrong with Manufacturing?

In last year's edition of the Security Navigator we noted that the Manufacturing Industry appeared to be totally over-represented in our dataset of Cyber Extortion victims. Neither the number of businesses nor their average revenue particularly stood out to explain this. Manufacturing was also the most represented Industry in our CyberSOC dataset – contributing more Incidents than any ...

Read More
Twitter Facebook LinkedIn
cover

THN Webinar: 3 Research-Backed Ways to Secure Your Identity Perimeter

Don't Let Cybercriminals Sneak in Through the Identity Perimeter: Get Actionable Solutions!

Download Now Sponsored

This email was sent to you. You are receiving this newsletter because you opted-in to receive relevant communications from The Hacker News. To manage your email newsletter preferences, please click here.

Contact The Hacker News: info@thehackernews.com
Unsubscribe

The Hacker News | Pearls Omaxe, Netaji Subash Place, Pitampura, Delhi 110034 India

Key phrases

Older messages

Act Now: Microsoft's New Security Patches Address 80 Flaws — Two Under Active Attack!

Thursday, March 16, 2023

The Hacker News Daily Updates Newsletter cover SBOM and Connected Device Security When it comes to device firmware and connected device security, where does a manufacturer or buyer start? Here's

Hackers Exploit 3-Year-Old Vulnerability to Breach U.S. Federal Agency!

Thursday, March 16, 2023

The Hacker News Daily Updates Newsletter cover THN Webinar: Master the Six Phases of Incident Response React fast, respond smart: Master the six phases of Incident Response with Cynet's IR Leader!

Fake ChatGPT Chrome Extension Hijacking Facebook Accounts for Malicious Advertising

Tuesday, March 14, 2023

The Hacker News Daily Updates Newsletter cover THN Webinar: Inside the High Risk of 3rd-Party SaaS Apps Don't be a victim of 3rd-Party SaaS App breaches - Learn how to protect your business!

Warning: Xenomorph Android Banking Trojan is Back and Stronger Than Ever!

Monday, March 13, 2023

The Hacker News Daily Updates Newsletter cover 2022 Elastic Global Threat Report Vol.1 2022 Download Now Sponsored LATEST NEWS Mar 13, 2023 Warning: AI-generated YouTube Video Tutorials Spreading

Warning: Xenomorph Android Banking Trojan is Back and Stronger Than Ever!

Saturday, March 11, 2023

The Hacker News Daily Updates Newsletter cover 2022 Elastic Global Threat Report Vol.1 2022 Download Now Sponsored LATEST NEWS Mar 11, 2023 New Version of Prometei Botnet Infects Over 10000 Systems

Llama.cpp 30B runs with only 6GB of RAM now — and CDC team studying East Palestine train derailment fell ill during investigation

Saturday, April 1, 2023

Issue #1089 — Top 20 stories of April 02, 2023 Issue #1089 — April 02, 2023 You receive this email because you are subscribed to Hacker News Digest. You can open it in the browser if you prefer. 1

Daily Coding Problem: Problem #1062 [Easy]

Saturday, April 1, 2023

Daily Coding Problem Good morning! Here's your coding interview problem for today. This problem was asked by Google. Given the head of a singly linked list, swap every two nodes and return its head

Animated Map | The Largest Cities Throughout History 🌃

Saturday, April 1, 2023

Where were the largest cities in the world throughout history? This video shows the rise (and fall) of the most populated cities from 3000 BCE. View Online | Subscribe FEATURED STORY The Largest Cities

How to Enable Dark Mode in Real Life

Saturday, April 1, 2023

Did You Know?: Graphene was first observed, via electron microscope, in 1962 and studied only while supported on metal surfaces. The material was later rediscovered, isolated, and characterized in 2004

Noonification: The Birth of an AI Martyr

Saturday, April 1, 2023

Top Tech Content sent at Noon! Invest in the company that's democratizing VC How are you, @hacker? 🪐 What's happening in tech this week: The Noonification by HackerNoon has got you covered with

Week in Review - Virgin Orbit runs low on cash, ByteDance pushes a TikTok replacement, and Canoo settles with the SEC

Saturday, April 1, 2023

TechCrunch Newsletter TechCrunch logo Week in Review logo By Kyle Wiggers Saturday, April 01, 2023 It's the weekend, party people, and you know what that means: It's Week in Review (WiR) time.

Startups Weekly - Always be prompting

Saturday, April 1, 2023

TechCrunch Newsletter TechCrunch logo Startups Weekly logo By Natasha Mascarenhas Saturday, April 01, 2023 Welcome to Startups Weekly, a nuanced take on this week's startup news and trends by

🐍 New Python tutorials on Real Python

Saturday, April 1, 2023

Hey there, There's always something going on over at realpython.com as far as Python tutorials go. Don't miss out on the opportunity to learn something new and sharpen your Python skills.

A Musical War of the Worlds 🛸

Saturday, April 1, 2023

The story of perhaps the most audacious rock opera of all time. Here's a version for your browser. Hunting for the end of the long tail • April 01, 2023 Hey all, Ernie here with a fresh one from

Cacti, Realtek, and IBM Aspera Faspex Vulnerabilities Under Active Exploitation

Saturday, April 1, 2023

The Hacker News Daily Updates Newsletter cover 7 Key Takeaways to Passwordless Authentication Moving Past Passwords (At Last!) Download Now Sponsored LATEST NEWS Apr 1, 2023 Microsoft Fixes New Azure