Back to Top
 

Dark Reading

28 September 2022

Dark Reading: Connecting the Information and Security Community Dark Reading

Threatpost

The First Stop For Security News

The Hacker News

28 September 2022

Most trusted, widely-read independent cybersecurity news source for everyone; supported by hackers and IT professionals — Send TIPs to admin@thehackernews.com
  • Cyber Criminals Using Quantum Builder Sold on Dark Web to Deliver Agent Tesla Malware
    28 September 2022
    A recently discovered malware builder called Quantum Builder is being used to deliver the Agent Tesla remote access trojan (RAT). "This campaign features enhancements and a shift toward LNK (Windows shortcut) files when compared to similar attacks in the past," Zscaler ThreatLabz researchers Niraj Shivtarkar and Avinash Kumar said in a Tuesday write-up. Sold on the dark web for €
  • Improve your security posture with Wazuh, a free and open source XDR
    28 September 2022
    Organizations struggle to find ways to keep a good security posture. This is because it is difficult to create secure system policies and find the right tools that help achieve a good posture. In many cases, organizations work with tools that do not integrate with each other and are expensive to purchase and maintain. Security posture management is a term used to describe the process of
  • Hackers Using PowerPoint Mouseover Trick to Infect System with Malware
    28 September 2022
    The Russian state-sponsored threat actor known as APT28 has been found leveraging a new code execution method that makes use of mouse movement in decoy Microsoft PowerPoint documents to deploy malware. The technique "is designed to be triggered when the user starts the presentation mode and moves the mouse," cybersecurity firm Cluster25 said in a technical report. "The code execution runs a
  • Facebook Shuts Down Covert Political 'Influence Operations' from Russia and China
    28 September 2022
    Meta Platforms on Tuesday disclosed it took steps to dismantle two covert influence operations originating from China and Russia for engaging in coordinated inauthentic behavior (CIB) so as to manipulate public debate. While the Chinese operation sets its sights on the U.S. and the Czech Republic, the Russian network primarily targeted Germany, France, Italy, Ukraine and the U.K. with themes
  • Critical WhatsApp Bugs Could Have Let Attackers Hack Devices Remotely
    28 September 2022
    WhatsApp has released security updates to address two flaws in its messaging app for Android and iOS that could lead to remote code execution on vulnerable devices. One of them concerns CVE-2022-36934 (CVSS score: 9.8), a critical integer overflow vulnerability in WhatsApp that results in the execution of arbitrary code simply by establishing a video call. The issue impacts the WhatsApp and

Naked Security

Computer Security News, Advice and Research Naked Security