The Hacker News Daily Updates
[Newsletter]( [cover]( [The Deep and Dark Web Guide]( Stay safe on the hidden web. [Download Now]( Sponsored LATEST NEWS Feb 7, 2023 [Hackers Exploit Vulnerabilities in Sunlogin to Deploy Sliver C2 Framework]( Threat actors are leveraging known flaws in Sunlogin software to deploy the Sliver command-and-control (C2) framework for carrying out post-exploitation activities. The findings come from AhnLab Security Emergency response Center (ASEC), which found that security vulnerabilities in Sunlogin, a remote desktop program developed in China, are being abused to deploy a wide range of payloads. ... [Read More](
[Twitter]( [Facebook]( [LinkedIn]( [Tackling the New Cyber Insurance Requirements: Can Your Organization Comply?]( With cyberattacks around the world escalating rapidly, insurance companies are ramping up the requirements to qualify for a cyber insurance policy. Ransomware attacks were up 80% last year, prompting underwriters to put in place a number of new provisions designed to prevent ransomware and stem the record number of claims. Among these are a mandate to enforce multi-factor authentication ... [Read More](
[Twitter]( [Facebook]( [LinkedIn]( [Donât let fraud and abuse derail your business!]( Target fraud and abuse with the unparalleled power and accuracy of hCaptcha Enterprise. From automated to human threats, see why startups and category leaders alike use our privacy-preserving security ML platform across their mobile & web apps, and ... [Read More](
[Twitter]( [Facebook]( [LinkedIn]( [Linux Variant of Clop Ransomware Spotted, But Uses Faulty Encryption Algorithm]( The first-ever Linux variant of the Clop ransomware has been detected in the wild, but with a faulty encryption algorithm that has made it possible to reverse engineer the process. "The ELF executable contains a flawed encryption algorithm making it possible to decrypt locked files without paying the ransom," SentinelOne researcher Antonis Terefos said in a report shared with The Hacker ... [Read More](
[Twitter]( [Facebook]( [LinkedIn]( [VMware Finds No Evidence of 0-Day in Ongoing ESXiArgs Ransomware Spree]( VMware on Monday said it found no evidence that threat actors are leveraging an unknown security flaw, i.e., a zero-day, in its software as part of an ongoing ransomware attack spree worldwide. "Most reports state that End of General Support (EoGS) and/or significantly out-of-date products are being targeted with known vulnerabilities which were previously addressed and disclosed in ... [Read More](
[Twitter]( [Facebook]( [LinkedIn]( [GuLoader Malware Using Malicious NSIS Executables to Target E-Commerce Industry]( E-commerce industries in South Korea and the U.S. are at the receiving end of an ongoing GuLoader malware campaign, cybersecurity firm Trellix disclosed late last month. The malspam activity is notable for transitioning away from malware-laced Microsoft Word documents to NSIS executable files for loading the malware. Other countries targeted as part of the campaign include Germany, Saudi ... [Read More](
[Twitter]( [Facebook]( [LinkedIn]( [Microsoft: Iranian Nation-State Group Sanctioned by U.S. Behind Charlie Hebdo Hack]( An Iranian nation-state group sanctioned by the U.S. government has been attributed to the hack of the French satirical magazine Charlie Hebdo in early January 2023. Microsoft, which disclosed details of the incident, is tracking the activity cluster under its chemical element-themed moniker NEPTUNIUM, which is an Iran-based company known as Emennet Pasargad. In January 2022, the U.S. ... [Read More](
[Twitter]( [Facebook]( [LinkedIn]( [SaaS in the Real World: Who's Responsible to Secure this Data?]( When SaaS applications started growing in popularity, it was unclear who was responsible for securing the data. Today, most security and IT teams understand the shared responsibility model, in which the SaaS vendor is responsible for securing the application, while the organization is responsible for securing their data. Whatâs far murkier, however, is where the data responsibility lies on ... [Read More](
[Twitter]( [Facebook]( [LinkedIn]( [cover]( [The Deep and Dark Web Guide]( Stay safe on the hidden web. [Download Now]( Sponsored This email was sent to {EMAIL}. You are receiving this newsletter because you opted-in to receive relevant communications from The Hacker News. To manage your email newsletter preferences, please [click here](. Contact The Hacker News: info@thehackernews.com
[Unsubscribe]( The Hacker News | Pearls Omaxe, Netaji Subash Place, Pitampura, Delhi 110034 India