The Hacker News Daily Updates
[Newsletter]( [cover]( [THN Webinar: 3 Research-Backed Ways to Secure Your Identity Perimeter]( Don't Let Cybercriminals Sneak in Through the Identity Perimeter: Get Actionable Solutions! [Download Now]( Sponsored LATEST NEWS Mar 18, 2023 [Chinese Hackers Exploit Fortinet Zero-Day Flaw for Cyber Espionage Attack]( The zero-day exploitation of a now-patched medium-severity security flaw in the Fortinet FortiOS operating system has been linked to a suspected Chinese hacking group. Threat intelligence firm Mandiant, which made the attribution, said the activity cluster is part of a broader campaign designed to deploy backdoors onto Fortinet and VMware solutions and maintain persistent access to ... [Read More](
[Twitter]( [Facebook]( [LinkedIn]( [Pompompurin Unmasked: Infamous BreachForums Mastermind Arrested in New York]( U.S. law enforcement authorities have arrested a New York man in connection with running the infamous BreachForums hacking forum under the online alias "Pompompurin." The development, first reported by Bloomberg Law, comes after News 12 Westchester, earlier this week, said that federal investigators "spent hours inside and outside of a home in Peekskill." "At one point, investigators were ... [Read More](
[Twitter]( [Facebook]( [LinkedIn]( [THN Webinar: 3 Research-Backed Ways to Secure Your Identity Perimeter]( Think of the typical portrayal of a cyberattack. Bad guy pounding furiously on a keyboard, his eyes peeking out from under a dark hoodie. At long last, his efforts pay off and he hits the right combination of keys. "I'm in!" he shouts in triumph. Clearly, there are many problems with this scenario â and it's not just the hoodie. What's even more inaccurate is that most cyber attackers today ... [Read More](
[Twitter]( [Facebook]( [LinkedIn]( [LockBit 3.0 Ransomware: Inside the Cyberthreat That's Costing Millions]( U.S. government agencies have released a joint cybersecurity advisory detailing the indicators of compromise (IoCs) and tactics, techniques, and procedures (TTPs) associated with the notorious LockBit 3.0 ransomware. "The LockBit 3.0 ransomware operations function as a Ransomware-as-a-Service (RaaS) model and is a continuation of previous versions of the ransomware, LockBit 2.0, and ... [Read More](
[Twitter]( [Facebook]( [LinkedIn]( [FakeCalls Vishing Malware Targets South Korean Users via Popular Financial Apps]( An Android voice phishing (aka vishing) malware campaign known as FakeCalls has reared its head once again to target South Korean users under the guise of over 20 popular financial apps. "FakeCalls malware possesses the functionality of a Swiss army knife, able not only to conduct its primary aim but also to extract private data from the victim's device," cybersecurity firm Check Point ... [Read More](
[Twitter]( [Facebook]( [LinkedIn]( [New GoLang-Based HinataBot Exploiting Router and Server Flaws for DDoS Attacks]( A new Golang-based botnet dubbed HinataBot has been observed to leverage known flaws to compromise routers and servers and use them to stage distributed denial-of-service (DDoS) attacks. "The malware binaries appear to have been named by the malware author after a character from the popular anime series, Naruto, with file name structures such as 'Hinata--,'" Akamai said in ... [Read More](
[Twitter]( [Facebook]( [LinkedIn]( [A New Security Category Addresses Web-borne Threats]( In the modern corporate IT environment, which relies on cloud connectivity, global connections and large volumes of data, the browser is now the most important work interface. The browser connects employees to managed resources, devices to the web, and the on-prem environment to the cloud one. Yet, and probably unsurprisingly, this browser prominence has significantly increased the number ... [Read More](
[Twitter]( [Facebook]( [LinkedIn]( [Lookalike Telegram and WhatsApp Websites Distributing Cryptocurrency Stealing Malware]( Copycat websites for instant messaging apps like Telegram and WhatApp are being used to distribute trojanized versions and infect Android and Windows users with cryptocurrency clipper malware. "All of them are after victims' cryptocurrency funds, with several targeting cryptocurrency wallets," ESET researchers Lukáš Å tefanko and Peter StrýÄek said in a new analysis. While the first instance ... [Read More](
[Twitter]( [Facebook]( [LinkedIn]( [cover]( [THN Webinar: 3 Research-Backed Ways to Secure Your Identity Perimeter]( Don't Let Cybercriminals Sneak in Through the Identity Perimeter: Get Actionable Solutions! [Download Now]( Sponsored This email was sent to {EMAIL}. You are receiving this newsletter because you opted-in to receive relevant communications from The Hacker News. To manage your email newsletter preferences, please [click here](. Contact The Hacker News: info@thehackernews.com
[Unsubscribe]( The Hacker News | Pearls Omaxe, Netaji Subash Place, Pitampura, Delhi 110034 India