The Hacker News Most trusted, widely-read independent cybersecurity news source for everyone; supported by hackers and IT professionals — Send TIPs to [email protected]

  • Hackers Exploit Microsoft Browser Bug to Deploy VBA Malware on Targeted PCs
    by [email protected] (Ravie Lakshmanan) on July 29, 2021 at 3:18 pm

    An unidentified threat actor has been exploiting a now-patched zero-day flaw in Internet Explorer browser to deliver a fully-featured VBA-based remote access trojan (RAT) capable of accessing files stored in compromised Windows systems, and downloading and executing malicious payloads as part of an "unusual" campaign. The backdoor is distributed via a decoy document named "Manifest.docx" that

  • New Android Malware Uses VNC to Spy and Steal Passwords from Victims
    by [email protected] (Ravie Lakshmanan) on July 29, 2021 at 2:51 pm

    A previously undocumented Android-based remote access trojan (RAT) has been found to use screen recording features to steal sensitive information on the device, including banking credentials, and open the door for on-device fraud. Dubbed "Vultur" due to its use of Virtual Network Computing (VNC)'s remote screen-sharing technology to gain full visibility on targeted users, the mobile malware was

  • New Ransomware Gangs — Haron and BlackMatter — Emerge on Cybercrime Forums
    by [email protected] (Ravie Lakshmanan) on July 29, 2021 at 2:51 pm

    Two new ransomware-as-service (RaaS) programs have appeared on the threat radar this month, with one group professing to be a successor to DarkSide and REvil, the two infamous ransomware syndicates that went off the grid following major attacks on Colonial Pipeline and Kaseya over the past few months. "The project has incorporated in itself the best features of DarkSide, REvil, and LockBit," the

  • Best Practices to Thwart Business Email Compromise (BEC) Attacks
    by [email protected] (The Hacker News) on July 29, 2021 at 9:17 am

    Business email compromise (BEC) refers to all types of email attacks that do not have payloads. Although there are numerous types, there are essentially two main mechanisms through which attackers penetrate organizations utilizing BEC techniques, spoofing and account take-over attacks. In a recent study, 71% of organizations acknowledged they had seen a business email compromise (BEC) attack

  • Top 30 Critical Security Vulnerabilities Most Exploited by Hackers
    by [email protected] (Ravie Lakshmanan) on July 29, 2021 at 8:21 am

    Intelligence agencies in Australia, the U.K., and the U.S. issued a joint advisory on Wednesday detailing the most exploited vulnerabilities in 2020 and 2021, once again demonstrating how threat actors are able to weaponize publicly disclosed flaws to their advantage swiftly. "Cyber actors continue to exploit publicly known—and often dated—software vulnerabilities against broad target sets,

UK Computer Companies - Business Directory Uk - Business listings for computer repair, support and hardware companies Computer Networking, Network Directory - Computer networking solutions providers and companies