Hackers Strike Ukraine with Deadly SmokeLoader and RoarBAT Malware

The Hacker News Daily Updates
Newsletter
cover

Insider Risk Management: Adapting to the Evolving Security Landscape

Insider risk management is an often discussed, yet largely misunderstood, topic. Learn about the impact of insider threats, how the insider mindset is evolving with today’s changing workplace and strategies to effectively manage insider risks.

Download Now Sponsored
LATEST NEWS May 8, 2023

How to Set Up a Threat Hunting and Threat Intelligence Program

Threat hunting is an essential component of your cybersecurity strategy. Whether you're getting started or in an advanced state, this article will help you ramp up your threat intelligence program. What is Threat Hunting? The cybersecurity industry is shifting from a reactive to a proactive approach. Instead of waiting for cybersecurity alerts and then addressing them, security organizations ...

Read More
Twitter Facebook LinkedIn

CERT-UA Warns of SmokeLoader and RoarBAT Malware Attacks Against Ukraine

An ongoing phishing campaign with invoice-themed lures is being used to distribute the SmokeLoader malware in the form of a polyglot file, according to the Computer Emergency Response Team of Ukraine (CERT-UA). The emails, per the agency, are sent using compromised accounts and come with a ZIP archive that, in reality, is a polyglot file containing a decoy document and a JavaScript file. ...

Read More
Twitter Facebook LinkedIn

The Golden Thread: Threat Correlation from Laptop to Cloud [Webinar]

Learn how to identify malicious activity earlier by correlating rich security data across various attack surfaces. Join the Uptycs team as they walk through a golden thread that tracks a hacker's activity from laptop to ...

Read More
Twitter Facebook LinkedIn

Dragon Breath APT Group Using Double-Clean-App Technique to Target Gambling Industry

An advanced persistent threat (APT) actor known as Dragon Breath has been observed adding new layers of complexity to its attacks by adopting a novel DLL side-loading mechanism. "The attack is based on a classic side-loading attack, consisting of a clean application, a malicious loader, and an encrypted payload, with various modifications made to these components over time," Sophos ...

Read More
Twitter Facebook LinkedIn

New Vulnerability in Popular WordPress Plugin Exposes Over 2 Million Sites to Cyberattacks

Users of Advanced Custom Fields plugin for WordPress are being urged to update version 6.1.6 following the discovery of a security flaw. The issue, assigned the identifier CVE-2023-30777, relates to a case of reflected cross-site scripting (XSS) that could be abused to inject arbitrary executable scripts into otherwise benign websites. The plugin, which is available both as a free and ...

Read More
Twitter Facebook LinkedIn

New Android Malware 'FluHorse' Targeting East Asian Markets with Deceptive Tactics

Various sectors in East Asian markets have been subjected to a new email phishing campaign that distributes a previously undocumented strain of Android malware called FluHorse that abuses the Flutter software development framework. "The malware features several malicious Android applications that mimic legitimate applications, most of which have more than 1,000,000 installs," Check ...

Read More
Twitter Facebook LinkedIn

Hackers Targeting Italian Corporate Banking Clients with New Web-Inject Toolkit DrIBAN

Italian corporate banking clients are the target of an ongoing financial fraud campaign that has been leveraging a new web-inject toolkit called drIBAN since at least 2019. "The main goal of drIBAN fraud operations is to infect Windows workstations inside corporate environments trying to alter legitimate banking transfers performed by the victims by changing the beneficiary and ...

Read More
Twitter Facebook LinkedIn

N. Korean Kimsuky Hackers Using New Recon Tool ReconShark in Latest Cyberattacks

The North Korean state-sponsored threat actor known as Kimsuky has been discovered using a new reconnaissance tool called ReconShark as part of an ongoing global campaign. "[ReconShark] is actively delivered to specifically targeted individuals through spear-phishing emails, OneDrive links leading to document downloads, and the execution of malicious macros," SentinelOne researchers Tom ...

Read More
Twitter Facebook LinkedIn
cover

How Supply Chain Attacks Work, and How to Stop Them

Security leaders are scrambling to assess the security of their supply chains. Here are some ways to protect applications and third-party partnerships from attack.

Download Now Sponsored

This email was sent to you. You are receiving this newsletter because you opted-in to receive relevant communications from The Hacker News. To manage your email newsletter preferences, please click here.

Contact The Hacker News: info@thehackernews.com
Unsubscribe

The Hacker News | Pearls Omaxe, Netaji Subash Place, Pitampura, Delhi 110034 India

Key phrases

Older messages

Beware of FluHorse — Sneaky New Android Malware with Deceptive Tactics

Saturday, May 6, 2023

The Hacker News Daily Updates Newsletter cover 2023 CyberEdge Cyberthreat Defense Report 85% of organizations suffered from a successful cyberattack last year. This year, organizations are prioritizing

Warning: Packagist Repository Hacked with Over a Dozen Packages Compromised!

Friday, May 5, 2023

The Hacker News Daily Updates Newsletter cover You Can't Have True Zero Trust Without API Security Learn the New Paradigm of Zero Trust and How it Can Help Your Organization Become More Secure and

Passkeys: A New Way to Log into Google Accounts Without Passwords!

Thursday, May 4, 2023

The Hacker News Daily Updates Newsletter cover THN Webinar: Extend Zero Trust with Deception-based Active Defense Join us for an insightful session on using deception to outsmart adversaries in your

Breaking: Apple and Google team up to stop unauthorized location tracking!

Wednesday, May 3, 2023

The Hacker News Daily Updates Newsletter cover Webinar: Real-Time MFA and Service Account Protection Can Defeat Ransomware Attacks Learn how real-time MFA and service account protection can defeat

LOBSHOT: A Stealthy, Financial Trojan and Info Stealer Delivered through Google Ads

Tuesday, May 2, 2023

The Hacker News Daily Updates Newsletter cover Reducing Cyber Risk with Preventative Cyber Security Brought to you by Darktrace Download Now Sponsored LATEST NEWS May 2, 2023 BouldSpy Android Spyware:

You Might Also Like

Peloton's grim post-pandemic reality

Friday, May 3, 2024

The Morning After It's Friday, May 03, 2024. Peloton had a great pandemic. It's a weird thing to say, but the company's premium exercise equipment (expanding from bikes to treadmills and

Four Critical Vulnerabilities Expose HPE Aruba Devices to RCE Attacks

Friday, May 3, 2024

THN Daily Updates Newsletter cover Enterprise Transformation to AI and the Metaverse ($59.99 Value) FREE for a Limited Time Strategies for the Technology Revolution Download Now Sponsored LATEST NEWS

Post from Syncfusion Blogs on 05/03/2024

Friday, May 3, 2024

New blogs from Syncfusion Create Interactive Floor Planner Diagrams using Blazor Diagram Library By Keerthivasan R This blog explains how to create interactive floor planner diagrams using the

ASP.NET Core News - 05/03/2024

Friday, May 3, 2024

View this email in your browser Get ready for this weeks best blog posts about ASP.NET Core! This newsletter is sponsored by elmah.io - the most advanced, yet so simple to set up, error logging and

Hacker Newsletter #698

Friday, May 3, 2024

There is nothing more uncommon than common sense. //Frank Lloyd Wright hackernewsletter Issue #698 // 2024-05-03 // View in your browser #Favorites Lattice is the AI-powered people platform that

OpenAI search May 9 rumor 🤖, Tesla cuts interns 🚗, building a rocket engine 🚀

Friday, May 3, 2024

Reports indicate that OpenAI is looking to launch a search engine soon. OpenAI's in-house event on May 9 may focus on its release Sign Up |Advertise|View Online TLDR Together With LMNT TLDR 2024-05

Data Science Weekly - Issue 545

Friday, May 3, 2024

Curated news, articles and jobs related to Data Science, AI, & Machine Learning ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏

When accelerator dreams become company nightmares

Thursday, May 2, 2024

Plus: Illinois gives Rivian incentives and AI is not SaaS View this email online in your browser By Christine Hall Thursday, May 2, 2024 Hello, and welcome back to TechCrunch PM. We have a great lineup

📱 Issue 409 - Claude Team plan and iOS app

Thursday, May 2, 2024

This week's Awesome iOS Weekly Read this email on the Web The Awesome iOS Weekly Issue » 409 Release Date May 02, 2024 Your weekly report of the most popular iOS news, articles and projects Popular

💻 Issue 415 - Hotel WiFi JavaScript Injection (2012)

Thursday, May 2, 2024

This week's Awesome JavaScript Weekly Read this email on the Web The Awesome JavaScript Weekly Issue » 415 Release Date May 02, 2024 Your weekly report of the most popular JavaScript news, articles