The Hacker News Daily Updates
[Newsletter]( [cover]( [Cybersecurity Maturity Model Certification (CMMC) Version 1.02]( Cybersecurity Maturity Model Certification (CMMC) Version 1.02 Implementing Essential Security and Privacy Controls with CyberArk Solutions For the more than 300,000 companies that supply the U.S. Department of Defense (DoD), cybersecurity is uniquely important because theft of information from these companies could damage the U.S. economy, undermine technical advantages and threaten national security. [Download Now]( Sponsored LATEST NEWS Apr 7, 2023 [Microsoft Takes Legal Action to Disrupt Cybercriminals' Illegal Use of Cobalt Strike Tool]( Microsoft said it teamed up with Fortra and Health Information Sharing and Analysis Center (Health-ISAC) to tackle the abuse of Cobalt Strike by cybercriminals to distribute malware, including ransomware. To that end, the tech giant's Digital Crimes Unit (DCU) revealed that it secured a court order in the U.S. to "remove illegal, legacy copies of Cobalt Strike so they can no longer be used ... [Read More](
[Twitter]( [Facebook]( [LinkedIn]( [Are Source Code Leaks the New Threat Software vendors Should Care About?]( Less than a month ago, Twitter indirectly acknowledged that some of its source code had been leaked on the code-sharing platform GitHub by sending a copyright infringement notice to take down the incriminated repository. The latter is now inaccessible, but according to the media, it was accessible to the public for several months. A user going by the name FreeSpeechEnthousiast ... [Read More](
[Twitter]( [Facebook]( [LinkedIn]( [CISA Warns of Critical ICS Flaws in Hitachi, mySCADA, ICL, and Nexx Products]( The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has published eight Industrial Control Systems (ICS) advisories warning of critical flaws affecting products from Hitachi Energy, mySCADA Technologies, Industrial Control Links, and Nexx. Topping the list is CVE-2022-3682 (CVSS score: 9.9), impacting Hitachi Energy's MicroSCADA System Data Manager SDM600 that could allow ... [Read More](
[Twitter]( [Facebook]( [LinkedIn]( [Supply Chain Attacks and Critical Infrastructure: How CISA Helps Secure a Nation's Crown Jewels]( Critical infrastructure attacks are a preferred target for cyber criminals. Here's why and what's being done to protect them. What is Critical Infrastructure and Why is It Attacked? Critical infrastructure is the physical and digital assets, systems and networks that are vital to national security, the economy, public health, or safety. It can be government- or privately-owned. According to ... [Read More](
[Twitter]( [Facebook]( [LinkedIn]( [FBI Cracks Down on Genesis Market: 119 Arrested in Cybercrime Operation]( A joint international law enforcement operation has dismantled Genesis Market, an illegal online marketplace that specialized in the sale of stolen credentials associated with email, bank accounts, and social media platforms. Coinciding with the infrastructure seizure, the major crackdown, which involved authorities from 17 countries, culminated in 119 arrests and 208 property searches in ... [Read More](
[Twitter]( [Facebook]( [LinkedIn]( [Google Mandates Android Apps to Offer Easy Account Deletion In-App and Online]( Google is enacting a new data deletion policy for Android apps that allow account creation to also offer users with a setting to delete their accounts in an attempt to provide more transparency and control over their data. "For apps that enable app account creation, developers will soon need to provide an option to initiate account and data deletion from within the app and online," ... [Read More](
[Twitter]( [Facebook]( [LinkedIn]( [CryptoClippy: New Clipper Malware Targeting Portuguese Cryptocurrency Users]( Portuguese users are being targeted by a new malware codenamed CryptoClippy that's capable of stealing cryptocurrency as part of a malvertising campaign. The activity leverages SEO poisoning techniques to entice users searching for "WhatsApp web" to rogue domains hosting the malware, Palo Alto Networks Unit 42 said in a new report published today. CryptoClippy, a C-based executable, is a ... [Read More](
[Twitter]( [Facebook]( [LinkedIn]( [Hackers Using Self-Extracting Archives Exploit for Stealthy Backdoor Attacks]( An unknown threat actor used a malicious self-extracting archive (SFX) file in an attempt to establish persistent backdoor access to a victim's environment, new findings from CrowdStrike show. SFX files are capable of extracting the data contained within them without the need for dedicated software to display the file contents. It achieves this by including a decompressor stub, a piece of ... [Read More](
[Twitter]( [Facebook]( [LinkedIn]( [cover]( [Cybersecurity Maturity Model Certification (CMMC) Version 1.02]( Cybersecurity Maturity Model Certification (CMMC) Version 1.02 Implementing Essential Security and Privacy Controls with CyberArk Solutions For the more than 300,000 companies that supply the U.S. Department of Defense (DoD), cybersecurity is uniquely important because theft of information from these companies could damage the U.S. economy, undermine technical advantages and threaten national security. [Download Now]( Sponsored This email was sent to {EMAIL}. You are receiving this newsletter because you opted-in to receive relevant communications from The Hacker News. To manage your email newsletter preferences, please [click here](. Contact The Hacker News: info@thehackernews.com
[Unsubscribe]( The Hacker News | Pearls Omaxe, Netaji Subash Place, Pitampura, Delhi 110034 India