The Hacker News Daily Updates
[Newsletter]( [cover]( [Unidirectional Security for Power Generation: Advanced Solutions]( Dramatically improve your security with Waterfall's Unidirectional Gateways and learn why they are essential to modern security programs for power generating utilities. [Download Now]( Sponsored LATEST NEWS Apr 22, 2023 [Lazarus X_TRADER Hack Impacts Critical Infrastructure Beyond 3CX Breach]( Lazarus, the prolific North Korean hacking group behind the cascading supply chain attack targeting 3CX, also breached two critical infrastructure organizations in the power and energy sector and two other businesses involved in financial trading using the trojanized X_TRADER application. The new findings, which come courtesy of Symantec's Threat Hunter Team, confirm earlier suspicions that ... [Read More](
[Twitter]( [Facebook]( [LinkedIn]( [ChatGPT's Data Protection Blind Spots and How Security Teams Can Solve Them]( In the short time since their inception, ChatGPT and other generative AI platforms have rightfully gained the reputation of ultimate productivity boosters. However, the very same technology that enables rapid production of high-quality text on ... [Read More](
[Twitter]( [Facebook]( [LinkedIn]( [CISA Adds 3 Actively Exploited Flaws to KEV Catalog, including Critical PaperCut Bug]( The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added three security flaws to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The three vulnerabilities are as follows - CVE-2023-28432 (CVSS score - 7.5) - MinIO Information Disclosure Vulnerability CVE-2023-27350 (CVSS score - 9.8) - PaperCut MF/NG Improper Access ... [Read More](
[Twitter]( [Facebook]( [LinkedIn]( [Kubernetes RBAC Exploited in Large-Scale Campaign for Cryptocurrency Mining]( A large-scale attack campaign discovered in the wild has been exploiting Kubernetes (K8s) Role-Based Access Control (RBAC) to create backdoors and run cryptocurrency miners. "The attackers also deployed DaemonSets to take over and hijack resources of the K8s clusters they attack," cloud security firm Aqua said in a report shared with The Hacker News. The Israeli company, which dubbed the ... [Read More](
[Twitter]( [Facebook]( [LinkedIn]( [GhostToken Flaw Could Let Attackers Hide Malicious Apps in Google Cloud Platform]( Cybersecurity researchers have disclosed details of a now-patched zero-day flaw in Google Cloud Platform (GCP) that could have enabled threat actors to conceal an unremovable, malicious application inside a victim's Google account. Dubbed GhostToken by Israeli cybersecurity startup Astrix Security, the shortcoming impacts all Google accounts, including enterprise-focused Workspace accounts. ... [Read More](
[Twitter]( [Facebook]( [LinkedIn]( [14 Kubernetes and Cloud Security Challenges and How to Solve Them]( Recently, Andrew Martin, founder and CEO of ControlPlane, released a report entitled Cloud Native and Kubernetes Security Predictions 2023. These predictions underscore the rapidly evolving landscape of Kubernetes and cloud security, emphasizing the need for organizations to stay informed and adopt comprehensive security solutions to protect their digital assets. In response, Uptycs, the ... [Read More](
[Twitter]( [Facebook]( [LinkedIn]( [N.K. Hackers Employ Matryoshka Doll-Style Cascading Supply Chain Attack on 3CX]( The supply chain attack targeting 3CX was the result of a prior supply chain compromise associated with a different company, demonstrating a new level of sophistication with North Korean threat actors. Google-owned Mandiant, which is tracking the attack event under the moniker UNC4736, said the incident marks the first time it has seen a "software supply chain attack lead to another ... [Read More](
[Twitter]( [Facebook]( [LinkedIn]( [Cisco and VMware Release Security Updates to Patch Critical Flaws in their Products]( Cisco and VMware have released security updates to address critical security flaws in their products that could be exploited by malicious actors to execute arbitrary code on affected systems. The most severe of the vulnerabilities is a command injection flaw in Cisco Industrial Network Director (CVE-2023-20036, CVSS score: 9.9), which resides in the web UI component and arises as a result ... [Read More](
[Twitter]( [Facebook]( [LinkedIn]( [cover]( [Unidirectional Security for Power Generation: Advanced Solutions]( Dramatically improve your security with Waterfall's Unidirectional Gateways and learn why they are essential to modern security programs for power generating utilities. [Download Now]( Sponsored This email was sent to {EMAIL}. You are receiving this newsletter because you opted-in to receive relevant communications from The Hacker News. To manage your email newsletter preferences, please [click here](. Contact The Hacker News: info@thehackernews.com
[Unsubscribe]( The Hacker News | Pearls Omaxe, Netaji Subash Place, Pitampura, Delhi 110034 India