The Hacker News
Most trusted, widely-read independent cybersecurity news source for everyone; supported by hackers and IT professionals.
- New ‘FabricScape’ Bug in Microsoft Azure Service Fabric Impacts Linux Workloadsby email@example.com (Ravie Lakshmanan) on June 29, 2022 at 9:36 am
Cybersecurity researchers from Palo Alto Networks Unit 42 disclosed details of a new security flaw affecting Microsoft’s Service Fabric that could be exploited to obtain elevated permissions and seize control of all nodes in a cluster. The issue, which has been dubbed FabricScape (CVE-2022-30137), could be exploited on containers that are configured to have runtime access. It has been remediated
- New UnRAR Vulnerability Could Let Attackers Hack Zimbra Webmail Serversby firstname.lastname@example.org (Ravie Lakshmanan) on June 29, 2022 at 9:29 am
A new security vulnerability has been disclosed in RARlab’s UnRAR utility that, if successfully exploited, could permit a remote attacker to execute arbitrary code on a system that relies on the binary. The flaw, assigned the identifier CVE-2022-30333, relates to a path traversal vulnerability in the Unix versions of UnRAR that can be triggered upon extracting a maliciously crafted RAR archive.
- CISA Warns of Active Exploitation of ‘PwnKit’ Linux Vulnerability in the Wildby email@example.com (Ravie Lakshmanan) on June 29, 2022 at 7:40 am
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) this week moved to add a Linux vulnerability dubbed PwnKit to its Known Exploited Vulnerabilities Catalog, citing evidence of active exploitation. The issue, tracked as CVE-2021-4034 (CVSS score: 7.8), came to light in January 2022 and concerns a case of local privilege escalation in polkit’s pkexec utility, which allows an
- ZuoRAT Malware Hijacking Home-Office Routers to Spy on Targeted Networksby firstname.lastname@example.org (Ravie Lakshmanan) on June 29, 2022 at 7:40 am
A never-before-seen remote access trojan dubbed ZuoRAT has been singling out small office/home office (SOHO) routers as part of a sophisticated campaign targeting North American and European networks. The malware “grants the actor the ability to pivot into the local network and gain access to additional systems on the LAN by hijacking network communications to maintain an undetected foothold,”
- APT Hackers Targeting Industrial Control Systems with ShadowPad Backdoorby email@example.com (Ravie Lakshmanan) on June 29, 2022 at 3:13 am
Entities located in Afghanistan, Malaysia, and Pakistan are in the crosshairs of an attack campaign that targets unpatched Microsoft Exchange Servers as an initial access vector to deploy the ShadowPad malware. Russian cybersecurity firm Kaspersky, which first detected the activity in mid-October 2021, attributed it to a previously unknown Chinese-speaking threat actor. Targets include
Security magazine provides security industry news and trends on video surveillance, cyber security, physical security, security guards, access management and more for security executives and the security industry.
- How to keep cybercriminals off university campuseson June 29, 2022 at 4:00 am
Cyberattacks have had drastic effects on universities and colleges, from the compromise of student and staff data to the permanent shuttering of higher ed institutions. Follow these five steps to bolster university cybersecurity posture.
- 3 strategies for securing public gatheringson June 28, 2022 at 5:18 pm
Security leaders who protect public facilities and events should employ a mix of access control, surveillance and crowd monitoring to secure public gatherings, according to a recent information session from the Cybersecurity and Infrastructure Security Agency (CISA).
- Lithuania hit by DDoS cyberattackon June 28, 2022 at 4:00 pm
Russian hacker group Killnet has claimed responsibility for a distributed denial of service (DDoS) cyberattack on Lithuania.
- Ransomware in Q1 2022 doubled total 2021 volumeon June 28, 2022 at 3:53 pm
The WatchGuard Technologies Threat Lab Q1 2022 Internet Security Report detected more than double the volume of ransomware in the first quarter of 2022 compared to full year 2021.
- 2 out of 3 European citizens welcome digital ID walleton June 28, 2022 at 2:35 pm
Despite widespread support for the EU-backed Digital ID Wallet, security and data privacy concerns will need to be addressed, according to a new Thales survey.
The first stop for security news.
- Top Six Security Bad Habits, and How to Break Themby Infosec Contributor on June 28, 2022 at 1:05 pm
Shrav Mehta, CEO, Secureframe, outlines the top six bad habits security teams need to break to prevent costly breaches, ransomware attacks and prevent phishing-based endpoint attacks.
- Mitel VoIP Bug Exploited in Ransomware Attacksby Sagar Tiwari on June 28, 2022 at 12:42 pm
Researchers warn threat actors are using a novel remote code execution exploit to gain initial access to victim’s environments.
- ‘Killnet’ Adversary Pummels Lithuania with DDoS Attacks Over Blockadeby Elizabeth Montalbano on June 28, 2022 at 12:17 pm
Cyber collective Killnet claims it won’t let up until the Baltic country opens trade routes to and from the Russian exclave of Kaliningrad.
- Log4Shell Vulnerability Targeted in VMware Servers to Exfiltrate Databy Sagar Tiwari on June 28, 2022 at 11:57 am
CISA warns that threat actors are ramping up attacks against unpatched Log4Shell vulnerability in VMware servers.
- Google Warns Spyware Being Deployed Against Android, iOS Usersby Elizabeth Montalbano on June 24, 2022 at 11:02 am
The company is warning victims in Italy and Kazakhstan that they have been targeted by the malware from Italian firm RCS Labs.
Connecting the Security Industry with the Security Community
- The Unique Challenges of Companies Born in the Cloudby Bill Brenner on March 9, 2022 at 3:18 pm
There are stark differences between how to manage security policies for on-premises network environments and those that are 100% cloud-based. But many companies continue to struggle with those differences and have experienced plenty of pain as a result. It’s a challenge Rich Mogull has spent years trying to help companies navigate. Mogull, CISO at Firemon, The post The Unique Challenges of Companies Born in the Cloud appeared first on Security Weekly.
- Ransomware Damage Claims Driving Insurance Hikesby Deb Radcliff on January 12, 2022 at 11:12 pm
The costs of cyber insurance policies are rising exponentially while underwriters are tightening the rules around who qualifies for cyber insurance, and at the same time, insurer capacity is constricting dramatically. The numbers are all over the place, but the latest statistics from the Council of Insurance Agents and Brokers reported a 25.5% increase in The post Ransomware Damage Claims Driving Insurance Hikes appeared first on Security Weekly.
- Decrypt As If Your Security Depends on Itby Bill Brenner on November 2, 2021 at 5:35 pm
Encryption has reached near-full adoption by internal teams hoping to implement stronger security and privacy practices. Simultaneously, attackers are using the same mechanisms to hide their malicious activity from the defender’s line of sight. According to the Ponemon Institute’s 2021 Global Encryption Trends Study, 50% of organizations have an encryption plan consistently applied across their The post Decrypt As If Your Security Depends on It appeared first on Security Weekly.
- DevSecOps Scanning Challenges & Tipsby Bill Brenner on October 26, 2021 at 3:57 pm
There are many ways to do DevSecOps, and each organization — each security team, even — uses a different approach. Questions such as how many environments you have and the frequency of deployment of those environments are important in understanding how to integrate a security scanner into your DevSecOps machinery. The ultimate goal is speed The post DevSecOps Scanning Challenges & Tips appeared first on Security Weekly.
- It Should Be ‘Cybersecurity Culture Month’by Bill Brenner on October 19, 2021 at 4:41 pm
It’s Cybersecurity Awareness Month, but security awareness is about much more than just dedicating a month to a few activities. Security awareness is a journey, requiring motivation along the way. And culture. Especially culture.That’s the point Proofpoint Cybersecurity Evangelist Brian Reed drove home in a recent appearance on Business Security Weekly.“If your security awareness program The post It Should Be ‘Cybersecurity Culture Month’ appeared first on Security Weekly.