Researchers Shed Light on CatB Ransomware's Evasion Techniques

The Hacker News Daily Updates
Newsletter
cover

THN Webinar: Master the Six Phases of Incident Response

React fast, respond smart: Master the six phases of Incident Response with Cynet's IR Leader!

Download Now Sponsored
LATEST NEWS Mar 20, 2023

New Cyber Platform Lab 1 Decodes Dark Web Data to Uncover Hidden Supply Chain Breaches

This article has not been generated by ChatGPT.  2022 was the year when inflation hit world economies, except in one corner of the global marketplace – stolen data. Ransomware payments fell by over 40% in 2022 compared to 2021. More organisations chose not to pay ransom demands, according to findings by blockchain firm Chainalysis. Nonetheless, stolen data has value beyond a price tag, and ...

Read More
Twitter Facebook LinkedIn

Researchers Shed Light on CatB Ransomware's Evasion Techniques

The threat actors behind the CatB ransomware operation have been observed using a technique called DLL search order hijacking to evade detection and launch the payload. CatB, also referred to as CatB99 and Baxtoy, emerged late last year and is said to be an "evolution or direct rebrand" of another ransomware strain known as Pandora based on code-level similarities. It's worth noting that the ...

Read More
Twitter Facebook LinkedIn

CTF 101 workshop: Learn how to solve your first CTF hacking challenge

Want to compete in CTFs but don't know where to start? Join Snyk's CTF 101 workshop and build the security skills and experience you need to compete in ...

Read More
Twitter Facebook LinkedIn

Emotet Rises Again: Evades Macro Security via OneNote Attachments

The notorious Emotet malware, in its return after a short hiatus, is now being distributed via Microsoft OneNote email attachments in an attempt to bypass macro-based security restrictions and compromise systems. Emotet, linked to a threat actor tracked as Gold Crestwood, Mummy Spider, or TA542, continues to be a potent and resilient threat despite attempts by law enforcement to take it down. ...

Read More
Twitter Facebook LinkedIn

Chinese Hackers Exploit Fortinet Zero-Day Flaw for Cyber Espionage Attack

The zero-day exploitation of a now-patched medium-severity security flaw in the Fortinet FortiOS operating system has been linked to a suspected Chinese hacking group. Threat intelligence firm Mandiant, which made the attribution, said the activity cluster is part of a broader campaign designed to deploy backdoors onto Fortinet and VMware solutions and maintain persistent access to ...

Read More
Twitter Facebook LinkedIn

Pompompurin Unmasked: Infamous BreachForums Mastermind Arrested in New York

U.S. law enforcement authorities have arrested a New York man in connection with running the infamous BreachForums hacking forum under the online alias "Pompompurin." The development, first reported by Bloomberg Law, comes after News 12 Westchester, earlier this week, said that federal investigators "spent hours inside and outside of a home in Peekskill." "At one point, investigators were ...

Read More
Twitter Facebook LinkedIn

THN Webinar: 3 Research-Backed Ways to Secure Your Identity Perimeter

Think of the typical portrayal of a cyberattack. Bad guy pounding furiously on a keyboard, his eyes peeking out from under a dark hoodie. At long last, his efforts pay off and he hits the right combination of keys. "I'm in!" he shouts in triumph. Clearly, there are many problems with this scenario – and it's not just the hoodie. What's even more inaccurate is that most cyber attackers today ...

Read More
Twitter Facebook LinkedIn

LockBit 3.0 Ransomware: Inside the Cyberthreat That's Costing Millions

U.S. government agencies have released a joint cybersecurity advisory detailing the indicators of compromise (IoCs) and tactics, techniques, and procedures (TTPs) associated with the notorious LockBit 3.0 ransomware. "The LockBit 3.0 ransomware operations function as a Ransomware-as-a-Service (RaaS) model and is a continuation of previous versions of the ransomware, LockBit 2.0, and ...

Read More
Twitter Facebook LinkedIn
cover

THN Webinar: 3 Research-Backed Ways to Secure Your Identity Perimeter

Don't Let Cybercriminals Sneak in Through the Identity Perimeter: Get Actionable Solutions!

Download Now Sponsored

This email was sent to you. You are receiving this newsletter because you opted-in to receive relevant communications from The Hacker News. To manage your email newsletter preferences, please click here.

Contact The Hacker News: info@thehackernews.com
Unsubscribe

The Hacker News | Pearls Omaxe, Netaji Subash Place, Pitampura, Delhi 110034 India

Key phrases

Older messages

Cyber Kingpin – BreachForums' Mastermind Finally Caught in New York!

Saturday, March 18, 2023

The Hacker News Daily Updates Newsletter cover THN Webinar: 3 Research-Backed Ways to Secure Your Identity Perimeter Don't Let Cybercriminals Sneak in Through the Identity Perimeter: Get Actionable

Attention Samsung Users! Google Uncovers 18 Alarming Security Flaws in Exynos Chips

Friday, March 17, 2023

The Hacker News Daily Updates Newsletter cover THN Webinar: Master the Six Phases of Incident Response React fast, respond smart: Master the six phases of Incident Response with Cynet's IR Leader!

Act Now: Microsoft's New Security Patches Address 80 Flaws — Two Under Active Attack!

Thursday, March 16, 2023

The Hacker News Daily Updates Newsletter cover SBOM and Connected Device Security When it comes to device firmware and connected device security, where does a manufacturer or buyer start? Here's

Hackers Exploit 3-Year-Old Vulnerability to Breach U.S. Federal Agency!

Thursday, March 16, 2023

The Hacker News Daily Updates Newsletter cover THN Webinar: Master the Six Phases of Incident Response React fast, respond smart: Master the six phases of Incident Response with Cynet's IR Leader!

Fake ChatGPT Chrome Extension Hijacking Facebook Accounts for Malicious Advertising

Tuesday, March 14, 2023

The Hacker News Daily Updates Newsletter cover THN Webinar: Inside the High Risk of 3rd-Party SaaS Apps Don't be a victim of 3rd-Party SaaS App breaches - Learn how to protect your business!

Max Q - Things got disrupted

Monday, September 25, 2023

TechCrunch Newsletter TechCrunch logo Max Q logo By Aria Alamalhodaei Monday, September 25, 2023 Hello and welcome back to Max Q! I'm finally home after attending TechCrunch Disrupt, our flagship

Daily Coding Problem: Problem #1223 [Hard]

Monday, September 25, 2023

Daily Coding Problem Good morning! Here's your coding interview problem for today. This problem was asked by LinkedIn. You are given a binary tree in a peculiar string representation. Each node is

Visualized | Which Companies Own the Most Satellites? 🛰️

Monday, September 25, 2023

Despite Starlink's dominance in the satellite industry, the company is set to face intense competition in the coming years. View Online | Subscribe Presented by: How close is the US electricity

Wrapping up in SF, managing your data and more... | September 25

Monday, September 25, 2023

What's happening at TechCrunch this week TechCrunch events roundup Things are slowly returning to "normal" here in TechCrunch-land after an explosive TechCrunch Disrupt last week in San

Noonification: Model Quantization in Deep Neural Networks

Monday, September 25, 2023

Top Tech Content sent at Noon! 15k+ Startups Scaled Their Data Infrastructure with Segment. Apply Now! How are you, @hacker? 🪐 What's happening in tech this week: The Noonification by HackerNoon

The collapse of Microsoft Surface

Monday, September 25, 2023

How to fix IT burnout; Fedora 39 is lightning fast; FaceTime voicemails -- ZDNET ZDNET Tech Today - US September 25, 2023 placeholder Can Microsoft recover from the collapse of its Surface business?

Digest #117: Pre-Commit Hooks for Terraform 🤖

Monday, September 25, 2023

Digest #117: Pre-Commit Hooks for Terraform 🤖 #117: Pre-Commit Hooks for Terraform Hey there, DevOps enthusiasts! 👋🏻 We're back, and oh boy, do we have some juicy bits for you this week in the

😺 NEW from Microsoft

Monday, September 25, 2023

Amazon is stepping up its rivalry with Microsoft, Meta, Google, and more by agreeing to potentially invest $4 billion in... Product Hunt Read in browser AMAZON HAS ENTERED THE CHAT... Amazon is

From Watering Hole to Spyware: EvilBamboo Targets Tibetans, Uyghurs, and Taiwanese

Monday, September 25, 2023

The Hacker News Daily Updates Newsletter cover Safeguarding Servers We know servers to be an attacker's ultimate target, but while they do store or process large amounts of sensitive data, the

Tinder’s $500 a month tier is here

Monday, September 25, 2023

The Morning After It's Monday, September 25, 2023. Hey big spender. Tinder Select, the dating app's most exclusive tier, is rolling out now. It will cost love seekers $500 per month (or $6000