The Hacker News Daily Updates
[Newsletter]( [cover]( [THN Webinar: 3 Research-Backed Ways to Secure Your Identity Perimeter]( Don't Let Cybercriminals Sneak in Through the Identity Perimeter: Get Actionable Solutions! [Download Now]( Sponsored LATEST NEWS Mar 29, 2023 [How to Build a Research Lab for Reverse Engineering â 4 Ways]( Malware analysis is an essential part of security researcher's work. But working with malicious samples can be dangerous â it requires specialized tools to record their activity, and a secure environment to prevent unintended damage. However, manual lab setup and configuration can prove to be a laborious and time-consuming process. In this article, we'll look at 4 ways to create a ... [Read More](
[Twitter]( [Facebook]( [LinkedIn]( [Smart Mobility has a Blindspot When it Comes to API Security]( The emergence of smart mobility services and applications has led to a sharp increase in the use of APIs in the automotive industry. However, this increased reliance on APIs has also made them one of the most common attack vectors. According to Gartner, APIs account for 90% of the web application attack surface areas. With no surprise, similar trends are emerging also in the smart ... [Read More](
[Twitter]( [Facebook]( [LinkedIn]( [ICS Village & GRIMM Cyber Team Up for Interactive CyPhy⢠Experience at RSAC]( GRIMM's interactive approach to learning, coupled with ICS Village's mission for awareness, delivers a compelling experience using real IT and industrial equipment. RSAC attendees can visit our ICS sandbox and explore our CyberTown virtual ... [Read More](
[Twitter]( [Facebook]( [LinkedIn]( [Trojanized TOR Browser Installers Spreading Crypto-Stealing Clipper Malware]( Trojanized installers for the TOR anonymity browser are being used to target users in Russia and Eastern Europe with clipper malware designed to siphon cryptocurrencies since September 2022. "Clipboard injectors [...] can be silent for years, show no network activity or any other signs of presence until the disastrous day when they replace a crypto wallet address," Vitaly Kamluk, director ... [Read More](
[Twitter]( [Facebook]( [LinkedIn]( [North Korean APT43 Group Uses Cybercrime to Fund Espionage Operations]( A new North Korean nation-state cyber operator has been attributed to a series of campaigns orchestrated to gather strategic intelligence that aligns with Pyongyang's geopolitical interests since 2018. Google-owned Mandiant, which is tracking the activity cluster under the moniker APT43, said the group's motives are both espionage- and financially-motivated, leveraging techniques ... [Read More](
[Twitter]( [Facebook]( [LinkedIn]( [Microsoft Introduces GPT-4 AI-Powered Security Copilot Tool to Empower Defenders]( Microsoft on Tuesday unveiled Security Copilot in limited preview, marking its continued quest to embed AI-oriented features in an attempt to offer "end-to-end defense at machine speed and scale." Powered by OpenAI's GPT-4 generative AI and its own security-specific model, it's billed as a security analysis tool that enables cybersecurity analysts to quickly respond to threats, process ... [Read More](
[Twitter]( [Facebook]( [LinkedIn]( [Pakistan-Origin SideCopy Linked to New Cyberattack on India's Ministry of Defence]( An advanced persistent threat (APT) group that has a track record of targeting India and Afghanistan has been linked to a new phishing campaign that delivers Action RAT. According to Cyble, which attributed the operation to SideCopy, the activity cluster is designed to target the Defence Research and Development Organization (DRDO), the research and development wing of India's Ministry ... [Read More](
[Twitter]( [Facebook]( [LinkedIn]( [IcedID Malware Shifts Focus from Banking Fraud to Ransomware Delivery]( Multiple threat actors have been observed using two new variants of the IcedID malware in the wild with more limited functionality that removes functionality related to online banking fraud. IcedID, also known as BokBot, started off as a banking trojan in 2017. It's also capable of delivering additional malware, including ransomware. "The well-known IcedID version consists of an initial ... [Read More](
[Twitter]( [Facebook]( [LinkedIn]( [cover]( [THN Webinar: 3 Research-Backed Ways to Secure Your Identity Perimeter]( Don't Let Cybercriminals Sneak in Through the Identity Perimeter: Get Actionable Solutions! [Download Now]( Sponsored This email was sent to {EMAIL}. You are receiving this newsletter because you opted-in to receive relevant communications from The Hacker News. To manage your email newsletter preferences, please [click here](. Contact The Hacker News: info@thehackernews.com
[Unsubscribe]( The Hacker News | Pearls Omaxe, Netaji Subash Place, Pitampura, Delhi 110034 India